Home Cybersecurity Updated Rokku Ransomware Offers QR Scan Codes to Pay File Decryption Fee

Updated Rokku Ransomware Offers QR Scan Codes to Pay File Decryption Fee

Posted: April 1, 2016

rokku ransomware offer qr scan pay ransomRansomware is the talk of the town as of late. Every reputable security firm and outlet agrees that ransomware is the most prevalent malware threat currently multiplying the Internet. One of the most recent threats, known as Rokku Ransomware, is among a growing list of clever ransomware that offers alternative means of paying the ransom fee to decrypt files that have been encrypted by the malware. In the case of Rokku, it is offering computer users a QR scan code, to quickly and conveniently access a payment processing site.

As you may already know, recent ransomware threats are specifically designed to encrypt files on an infected Windows computer. After encryption of the files, the ransomware threat may relay a notification pop-up that explains how the user may decrypt their files so they may be accessible again. However, when it comes to threats like Rokku Ransomware in its earlier state, the process of enacting a payment to obtain a decryption key was sometimes lengthy and required that the computer user go through several actions to make the payment. In other words, it was nearly an act of congress to make your payment and receive a decryption key so you may restore operation to your ransomware-infected computer.

As an ingenious answer to the lengthy payment process, Rokku Ransomware is now offering a QR code that allows users to scan the QR code on their computer screen with their mobile phone's camera. After scanning, as you would imagine, the phone then loads up a payment processing site where users may easily order their decryption and utilize it to decrypt their files.

The newer variation of Rokku Ransomware that offers a QR scan code for ransom payments was first sighted by Avira, a security firm who has closely followed the trail of various emerging ransomware threats for some time. What Avira has noticed, is that Rokku is following the footsteps of many other ransomware threats in that they are now making it easier and streamlined for victims to make their ransom payments.

Hackers and cybercrooks can be considered as tyrannical, and at the same time, they are canny in the ways that they improve the "marketing" their malicious software and computer threats. Ransomware has turned into a multi-million-dollar business for cybercrooks who are relentless when it comes to finding new victims to pounce. Conjuring up methods to make it easier for victims to think they have an easy way out of a ransomware infection by paying a fee will only make cybercrooks more money.

What we have noticed in recent run-ins with ransomware in the last few months, is that many of the threats are relying on simplified messages, ones that are less confusing to victims of the destructive threats. While most ransomware will provide either an email address or link to utilize to load a payment processing site so users of infected computers can pay their money and be on their way to decrypting their files, the process remains to be cumbersome for some computer users.

Rokku is the first ransomware threat that we have seen utilize QR scan codes for redirecting victims to payment processing sites. Certainly, we believe Rokku will not be the last to employ clever methods for users of ransomware-infected computers to easily and quickly process ransom payments. Rokku ransomware has even gone as far as to lay out simple instructions which guide victims through a process of paying the ransom fee.

Let it be known, the ruthless actions of hackers and cybercrooks are endless, and nothing surprises us. Currently, the latest variation of Rokku Ransomware is not likely to be detected by most antivirus solutions. However, in the days or weeks to come as hackers rack up millions of dollars from threats like Rokku, we expect it to be detected and removed with updated antivirus and antimalware software.

What will ransomware hackers think of next?

Loading...