Home Malware Programs Ransomware MotoxLocker Ransomware

MotoxLocker Ransomware

Posted: September 23, 2016

Threat Metric

Threat Level: 2/10
Infected PCs: 94
First Seen: September 23, 2016
OS(es) Affected: Windows

The MotoxLocker Ransomware is an encryption Trojan basing its code off of the DetoxCrypto Ransomware family. Besides the unusable files created by its attempts to hold your PC's data up for ransom, the MotoxLocker Ransomware's primary symptoms include a desktop-hijacking feature that replaces your Windows background with its extortion demands. Victims should use other recovery methods as noted in this article, including anti-malware tools that can delete the MotoxLocker Ransomware and prevent any additional data encrypting attacks.

A Fresh Trojan Cleansing Your Files of Your Ownership

Some threat business models maintain themselves for longer than others, with many of the most long-lived threats of the current year being the output of Trojan-building toolkits offered by malware authors to third-party con artists. One such family worth examining is DetoxCrypto Ransomware, which, early on, gained some media attention for using Pokemon-themed ransom attacks. New versions of this threat, like the MotoxLocker Ransomware, eschew this strong theme in exchange for a direct approach.

The MotoxLocker Ransomware is deploying in a campaign targeting Croatian-speaking victims currently. The installation file uses the disguise of an ordinary PDF document, which increases the probability of the MotoxLocker Ransomware's distribution methods employing e-mail spam. After being launched, the fake PDF installs the MotoxLocker Ransomware in the format of a fake Trend Micro application. The MotoxLocker Ransomware then scans your PC for files to encrypt with its AES algorithm, and, afterward, hijacks the victim's desktop with its ransom instructions.

Malware experts took note of several ways in which the MotoxLocker Ransomware differs from other, famous file encrypting Trojans due to the absence of several symptoms. Symptoms missing among the MotoxLocker Ransomware include:

  • The MotoxLocker Ransomware does not rename any encrypted data or append a new extension to the end of their names. The encrypted content remains non-functional when the user tries to open it, as usual.
  • The MotoxLocker Ransomware does not use any advanced HTML pop-up windows or try to lock your screen. The only extortion message left by the MotoxLocker Ransomware, demanding fifty Euros in exchange for a decryptor and 'protection from similar invasions,' is embedded in the image it sets to your desktop background.

A Cyber-Toxin Cure that will not Cost You a Cent

The MotoxLocker Ransomware attacks require manual installations prompted by victims who launch threatening content without being aware of what they're doing. Just scanning potential threats before executing them could detect a MotoxLocker Ransomware installer. Casual PC users and operators of business PCs alike should be mindful of the increased activity surrounding e-mail infection vectors, with the corrupted attachments often utilizing relatively elaborate disguises, such as invoices customized for a single service or company.

Malware experts were able to confirm that of the two variants of the MotoxLocker Ransomware known, so far, at least one employs an insecure encryption key. PC owners who haven't stopped the MotoxLocker Ransomware with appropriate anti-malware protection may be able to restore their content by making inquiries within the PC security community about the proper decryption tools.

Even though the MotoxLocker Ransomware includes relatively amateurish mistakes in its encryption methodology, the persistence and highly-targeted nature of the threat make it clear that PCs have more to fear from the increasingly numerous, sprouting branches of the DetoxCrypto Ransomware.

Loading...