Home Malware Programs Ransomware '.korea File Extension' Ransomware

'.korea File Extension' Ransomware

Posted: March 5, 2019

The '.korea File Extension' Ransomware is a file-locking Trojan from the Crysis Ransomware's family, a Ransomware-as-a-Service business that 'rents' itself out to third parties. Criminals could install the Trojan by any of several exploits, ultimately, for locking the system's files and forcing users into paying ransoms. Keep well-maintained backups and anti-malware protection capable of finding and deleting the '.korea File Extension' Ransomware preemptively for reducing the danger to your files.

'Blaze It' Goes from Illegal Drugs to Illegal Software

A threat actor is taking a domain of Cock.li's free e-mail service, '420blaze.it,' for a ride in a campaign that captures files for ransoms. He's accomplishing these attacks with the additional help of a rented variant of the Crysis Ransomware, a family of RaaS-based, file-locker Trojans that's prolific and highly successful in its illicit marketplace. As a branch-off of the Dharma Ransomware update, like the .frendi Ransomware, the 'sebekgrime@tutanota.com' Ransomware, the '.aqva File Extension' Ransomware, or the Heets Ransomware, the new the '.korea File Extension' Ransomware uses a secure encryption that could keep your files under a permanent barricade.

Besides the marijuana reference in its e-mail and the Korea-themed extensions that it adds to any locked files, the '.korea File Extension' Ransomware has few traits distinguishing it from similar family members. The '.korea File Extension' Ransomware can block media by running a combination of the AES and RSA encryptions, append its extension into their names, and remove any of the Shadow Volume Copy-based backups. Malware experts continue warning that these attacks are invasive for users with large quantities of Microsoft Office content, including DOCs or XLSes especially, although other formats, such as PDFs and MP3s, are vulnerable, as well.

This family uses dual ransom notes: a pop-up that contains advanced HTML content and directions on paying the decryptor's ransom, and a shorter Notepad text file. The victims with backups on other devices are, in most cases, safe from any extortionist scenarios and can recover their work after disinfecting the PC. However, users with no spare copies of their media may find themselves considering paying a ransom with questionable consequences.

Tracking the Service of Trojan Data Strong-Arming

Ransomware-as-a-Service thrives off of predetermined configurations of barely-modified software for its criminal clients and uses mostly geographically-indiscriminate payloads. Since it's not likely that the '.korea File Extension' Ransomware is filtering out any victims that aren't in South or North Korea, Windows users should, in general, assume that they're at risk of infection. The recent versions of the Crysis Ransomware family are, generally, not decryptable by any free tools, which further heightens the need to prevent an attack, instead of repair one's files afterward.

Most attacks from this family use exploit kits on compromised websites, spammed e-mail attachments, or brute-forcing logins as their preferred modes of introduction. The users can rotate secure passwords, scan e-mail downloads before opening them, and disable script or Flash-based browser features for protecting themselves. Anti-malware products are, of course, recommended for uninstalling the '.korea File Extension' Ransomware or, more usually, identifying it before an attack.

Malware analysts require more statistics on the '.korea File Extension' Ransomware's distribution patterns and infection tactics, but such data doesn't require putting your files in danger. There's nothing to gain from forgetting your backup or opening a file brashly – except for the members of the Ransomware-as-a-Service industry.

Loading...