Home Malware Programs Ransomware Pokemon GO Ransomware

Pokemon GO Ransomware

Posted: August 15, 2016

Threat Metric

Threat Level: 8/10
Infected PCs: 15,950
First Seen: August 15, 2016
Last Seen: May 9, 2024
OS(es) Affected: Windows

Pokemon GO has already inspired many threat authors to create threats that lure victims by piggy-backing on the mobile game's ever-growing popularity. However, it is certainly unexpected to see that someone has decided to create a piece of ransomware that is based on the popular mobile game entirely. The Pokemon GO Ransomware is a cyber threat that utilizes AES encryption methods to lock the files of its victims and then demand a ransom fee. The ransomware appears to be unfinished, and malware researchers note that it only contains instructions written in Arabic. This reduces the chances that victims will be able to decrypt the ransomware's message significantly since it is more likely that most victims will not be familiar with this language. Another clue that the Pokemon GO Ransomware may not be active yet is that it attempts to establish a communication channel with an unreachable IP address that probably hosts the ransomware's Command & Control server.

All detected samples of the Pokemon GO Ransomware were hidden in a file called 'PokemonGo.exe' which uses the Pokemon Pikachu as its icon. When users launch the disguised ransomware, they signal the threat to start the encryption process unknowingly, as well as to carry several other harmful operations such as dropping the Pokemon GO Ransomware's files to multiple directories and removal storage devices. Furthermore, the Pokemon GO Ransomware creates a hidden administrator account under the name 'Hack3r'. Flash drives that have been infected with the Pokemon GO Ransomware may be used to infect other computers with which they are plugged in. The ransom note written in Arabic contains almost no valuable information, but the authors have provided their victims with a contact e-mail they can use to communicate – blackhat20152015@gmail.com

Malware researchers state that Pokemon GO Ransomware appears to be very similar to threats based on the Hidden Tear open-source ransomware project. Threats connected to this project are usually decrypted in a matter of days, and this means that victims of the Pokemon GO Ransomware must not pay the ransom fee. Instead, they should eliminate the threat with the help of an advanced anti-malware tool, nad then make sure to check security news website regularly to find out if a Pokemon GO Ransomware decrypter becomes available.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Pokemon GO Ransomware may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Loading...
Spywareremove.com uses cookies to provide you with a better browsing experience and analyze how users navigate and utilize the Site. By using this Site or clicking on "OK", you consent to the use of cookies. Learn more.