Home Malware Programs Ransomware Scarabey Ransomware

Scarabey Ransomware

Posted: December 13, 2017

Threat Metric

Threat Level: 1/10
Infected PCs: 47
First Seen: September 4, 2022
OS(es) Affected: Windows

The Scarabey Ransomware is a variant of the Scarab Ransomware, a Trojan that tries to prevent you from opening your media by encrypting it and also creates ransom-related Notepad messages. This update of the Trojan also includes a timed function for deleting your locked files periodically, similarly to the Jigsaw Ransomware. Affected users should use standard security protocols to disable this threat immediately before uninstalling the Scarabey Ransomware with any favored anti-malware product, and retrieve any encoded files by free methods.

A Bug with an Extra Bit of Bite

The pseudo-Russian Scarab Ransomware campaign is upgrading itself, either with new threat actors reusing the Trojan or old ones deciding to add ancillary features to its payload. The Scarabey Ransomware keeps the previous Trojan's attacks, but also includes data-erasing potential to force users to pay their ransoms without any hesitation. As always, malware researchers recommend protecting your PC from further attacks while searching for free alternatives for undoing the Scarabey Ransomware's media damage.

The Scarabey Ransomware's campaign is targeting Russian users explicitly, and the evidence available to malware researchers leads them to believe that threat actors are brute-forcing the logins of business-oriented networks for running the Trojan. Like the Scarab Ransomware, the Scarabey Ransomware locks a range of media types, such as spreadsheets or documents, and appends '.scarab' extensions to each name.

Also like its recent ancestor, the Scarabey Ransomware drops Notepad-formatted text messages for extorting Bitcoins from its victims in exchange for the key to decrypting and unlocking their media. The Scarabey Ransomware places a particularly strong emphasis on prompt payments within two days and motivates the act by deleting two-dozen encrypted files every day. As a result, whether you choose to pay or not, disabling the Scarabey Ransomware as soon as possible is required for minimizing the risks of losing your data permanently.

Beating Back a PC's Pest Invasion

The Scarabey Ransomware's geographical focus seems to be a result of opportunism rather than any significant familiarity its current administrators have with the nation. Frequent grammar issues with its ransom notes suggest that the threat actors are using translation tools or messages misappropriated from other sources, such as a branch of the Amnesia Ransomware family. While malware experts can provide no evidence of a working decryption program for the Scarabey Ransomware, the Trojan's dual capabilities of file deletion and encryption make it especially critical to keep secure backups of your media.

Using passwords with weak security, such as short strings, common phrases, and limited alphanumeric combinations can give cybercrooks easy access to your login data and, through it, the entirety of a home network or server. Employing better password management minimizes your risk from brute-force-based attacks, and users also should remain alert to potential infection vectors arriving through e-mail spamming campaigns. Rebooting your PC securely into Safe Mode or through a USB device is optimal for helping your anti-malware programs delete the Scarabey Ransomware without it being able to do the same to any content in the meantime.

The Scarabey Ransomware may be a Trojan that prefers extorting money from Russian companies, but the same payloads are observable throughout the rest of the file-locking Trojan industry and the world as a whole. Companies with data worth holding hostage, by definition, also have content that's worth protecting with careful password maintenance and backup scheduling.

Loading...