Home Malware Programs Ransomware HTRS Ransomware

HTRS Ransomware

Posted: May 15, 2017

The HTRS Ransomware is a variant of the Newht Ransomware, a Hidden Tear-based Trojan that can encrypt your files and use Notepad notes to extort money. Although this threat's payload offers symptoms that are highly distinguishable, it also can cause data loss that isn't always curable. Block or uninstall the HTRS Ransomware with a reputable anti-malware product and use backups to make your files less at risk from its attacks.

The Ongoing Saga of 'Educational' Code Pilfering

Of the various families of file-encrypting threats currently attacking the public, Hidden Tear is one of the most advanced, but it is easy to use, and its source code is available to prospective on artists widely. Just as often, malware experts identify threats from this family before their full releases, as well as afterward, such as the yet unfinished Newht Ransomware and its variant, the HTRS Ransomware. Since these Hidden Tear-based Trojans can block your files by default, their incomplete status isn't necessarily highly relevant during a system breach.

While its code was built as an educational demonstration of threatening file encryption originally, the HTRS Ransomware does include genuine, AES-based encryption features able to encode and block files of appropriate data formats. These file types often include documents, spreadsheets, and pictures, although threat actors can add other categories into the Trojan's whitelist. After blocking them, the HTRS Ransomware gives these files a new '.htrs' extension, which it shares with the Newht Ransomware.

Other symptoms include the HTRS Ransomware's depositing a Notepad message on the compromised system's desktop. Since the HTRS Ransomware isn't in a final build state, this message is only displaying the victim's ID number and a brief warning. In the future, malware experts would anticipate the HTRS Ransomware using the text for delivering ransom demands to sell its decryption solution and unlock your files.

Ending One Chapter in the Story of Freeware Ransoming Trojans

Because threat actors are reliant on cryptocurrency-based cash transactions that the victim can't refund without their consent, paying a ransom to unlock your files is a high-risk recovery strategy. Malware experts also underline the potential vulnerability of many Hidden Tear-based threats to free decryption solutions, potentially encompassing the HTRS Ransomware, as well. Anyone without backups to make decryption access an irrelevance should always investigate all free decryptors before using one sold by a con artist-sold one.

The HTRS Ransomware is a small, highly portable executable that is compatible with most Windows PCs. Threat actors may circulate it manually after gaining access to your computer through such techniques as brute-forcing a network's password, but also could attach it to spam e-mails or embed it into drive-by-download attacks. Having good password management skills, safe browsing habits and general anti-malware protection can stop or delete the HTRS Ransomware beforehand, in most circumstances.

Even in a partially complete state, a Trojan like the HTRS Ransomware is more than capable of damaging what's on your computer permanently. If that fact is concerning, malware experts would recommend that you back your files up to another machine.

Loading...