Home Malware Programs Ransomware 'amagnus@india.com' Ransomware

'amagnus@india.com' Ransomware

Posted: December 20, 2016

Threat Metric

Threat Level: 8/10
Infected PCs: 101
First Seen: December 20, 2016
Last Seen: February 27, 2023
OS(es) Affected: Windows

The 'amagnus@india.com' Ransomware is a variant of the Dharma Ransomware and still is known for that Trojan's payload of blocking files by encrypting them. Its most visually prominent symptoms include potential changes to filenames or extensions, as well as generated extortion messages, both of which occur after it's already caused damage. Having anti-malware protection able to remove the 'amagnus@india.com' Ransomware and backups to recover any blocked content are two of the most important defenses against this Trojan.

Small Trojan Problems Growing Bigger for Christmas

The Dharma Ransomware family is small comparatively, by the standards of most competitors in the threat industry. In spite of that, malware experts see a trickle of re-releases of this threat, most likely owing to a rental model where third-party threat actors customize their personal version of it. The 'amagnus@india.com' Ransomware is the last of these clones to date, bolstering the ranks filled by the nearly-identical 'Supermagnet@india.com' Ransomware and 'Lavandos@dr.com' Ransomware previously.

Samples of the 'amagnus@india.com' Ransomware that malware experts analyze so far indicate that it may be campaigning with Spanish or English-speaking targets as its victims of choice. Its installation exploits may misrepresent the Trojan as a browser add-on, such as a homepage extension. The small size (less than one megabyte) lets the 'amagnus@india.com' Ransomware install itself quickly, and with a minimal footprint.

The 'amagnus@india.com' Ransomware's payload includes data-encrypting attacks that modify files of formats that the Trojan includes in its whitelist. The encryption function, using a cipher based on conventional techniques such as the AES-128 or the Blowfish, blocks the file in question until you can decrypt it, which is only possible with its key code. Malware experts also see members of the 'amagnus@india.com' Ransomware's family modifying filenames of all locked content routinely, by inserting an e-mail address and an identification number usually.

Bidding Goodnight to a Well-Worn Holiday Attack

The 'amagnus@india.com' Ransomware uses Notepad files to communicate its 'good morning' ransom requests for restoring your data, although the sum its threat actors demand is not yet known. Malware campaigns of this category use anonymous currency measures almost entirely, such as Bitcoin. As a direct consequence, paying risks a high chance of losing your money but not getting any services back afterward.

For most scenarios involving Trojans that damage your local files either deliberately or incidentally, malware experts recommend restoring content through your backups. Backups on password-protected cloud servers and external devices not connected to the infected machine are ideal recovery options. Otherwise, the victims' best hope is to block and delete the 'amagnus@india.com' Ransomware with their anti-malware security preemptively.

The 'amagnus@india.com' Ransomware may install itself through direct attacks against network accounts with easily-cracked passwords, exploit kits hosting themselves on hostile Web pages, spam e-mails or mislabeled downloads. Since an ounce of prevention is worth a pound of cure, even for threatening software, malware experts recommend attending to all of these security vulnerabilities with diligence, such as by scanning all new files before opening them.

Loading...