{"id":7428,"date":"2016-07-13T09:50:31","date_gmt":"2016-07-13T13:50:31","guid":{"rendered":"https:\/\/kasperskydaily.com\/uk\/?p=7428"},"modified":"2020-02-26T15:12:00","modified_gmt":"2020-02-26T15:12:00","slug":"ranscam-ransomware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/ranscam-ransomware\/7428\/","title":{"rendered":"Ranscam doesn&#8217;t care if you pay the ransom"},"content":{"rendered":"<p>When ransomware hits, it\u2019s natural to wonder if it might be worth\u00a0just\u00a0paying the ransom to get your electronic life back with the minimum of fuss. At Kaspersky Lab, we don\u2019t recommend paying the ransom, but in the case of new ransomware called Ranscam, there really is no point: It deletes your\u00a0files anyway.<\/p>\n<p>Threatpost reports on the <a href=\"https:\/\/threatpost.com\/ranscam-ransomware-deletes-victims-files-outright\/119197\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">new malware<\/a>, noting that in contrast with recent ransomware of breathtaking proficiency, Ranscam seems either lazy or not particularly competent. A sledgehammer among scalpels.<br>\nUnfortunately, a sledgehammer is a pretty destructive tool. Where sophisticated ransomware aims to extract victims\u2019 money and then, likely or not, restores the files or file systems it encrypted in the attack, Ranscam is just a scam.<\/p>\n<h3>How Ranscam works<\/h3>\n<p>The first thing users will see after the malware has found its way into their system is the ransom note. It looks like the ransom notes that other pieces of ransomware show, but with one seemingly insignificant difference. Instead of directing users to an external location where they are supposed to verify the ransom payment, this note shows a clickable button: \u201cI made payment, please verify.\u201d<\/p>\n<p>In reality, the difference is very significant. Whenever a user clicks the button, a message appears, saying the payment was not verified and that one file will be deleted each time the button is pressed without the criminals behind Ranscam having been paid. That is probably supposed to make users nervous and persuade them to pay several times.<\/p>\n<p>In fact it\u2019s just a bluff \u2014 but that\u2019s not good news for the victim. The ransomware states that it has moved the user\u2019s files into a \u201chidden, encrypted partition,\u201d but in reality, it deleted them before even showing the ransom message. So there\u2019s no way to retrieve them.<\/p>\n<p>As researchers at Cisco\u2019s Talos Security Intelligence and Research Group <a href=\"http:\/\/blog.talosintel.com\/2016\/07\/ranscam.html#more\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">explain<\/a>, simply destroying the files means that the criminals don\u2019t need to learn the fine points of crypto-blocking and locking.<\/p>\n<p>At this point Ranscam has not been associated with any major attacks; it simply serves as a reminder that paying ransom may not work (not to mention, paying reinforces criminals\u2019 idea that ransomware is a great way to make money).<\/p>\n<p>There is no way to get back the files deleted by Ranscam; the only way to protect yourself is to be proactive. So we recommend a simple plan:<\/p>\n<p>1. <b>Don\u2019t open attachments and don\u2019t follow suspicious links.<\/b><br>\nNot much is known about how Ranscam spreads, but the usual suspects are e-mail attachments and malicious or hacked websites. So if you aren\u2019t 100% sure, don\u2019t click.<\/p>\n<p>2. <b>Back up your data regularly and store the backups on an offline storage device.<\/b><br>\nIf some ransomware encrypts or deletes your files, you\u2019re covered \u2014 you have copies.<\/p>\n<p>3. <b>Use a reliable antivirus solution.<\/b><br>\n<a href=\"https:\/\/www.kaspersky.co.uk\/advert\/internet-security?redef=1&amp;THRU&amp;reseller=gb_ukdaily_acq_ona_smm__onl_b2c_kasperskydaily_lnk_______\" target=\"_blank\" rel=\"noopener noreferrer\">Kaspersky Internet Security<\/a> detects Ranscam as <em>Trojan-Ransom.MSIL.Agent<\/em> and doesn\u2019t give the ransomware a chance to do anything bad to your files<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.<\/p>\n","protected":false},"author":2045,"featured_media":7429,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2026],"tags":[36,441,701,97,529],"class_list":{"0":"post-7428","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-malware-2","10":"tag-ransomware","11":"tag-scam","12":"tag-security-2","13":"tag-threats"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ranscam-ransomware\/7428\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ranscam-ransomware\/7402\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ranscam-ransomware\/7375\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ranscam-ransomware\/8707\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ranscam-ransomware\/8595\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ranscam-ransomware\/12488\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ranscam-ransomware\/2265\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ranscam-ransomware\/12583\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ranscam-ransomware\/5820\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ranscam-ransomware\/6478\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ranscam-ransomware\/5116\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ranscam-ransomware\/8171\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ranscam-ransomware\/11991\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ranscam-ransomware\/12488\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ranscam-ransomware\/12583\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ranscam-ransomware\/12583\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/malware-2\/","name":"malware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2045"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=7428"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7428\/revisions"}],"predecessor-version":[{"id":19296,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/7428\/revisions\/19296"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/7429"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=7428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=7428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=7428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}