• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Latest Version of Rapid Ransomware Doesn’t Encrypt Data with Russian System Locale

April 6, 2018Simeon Georgiev

New cryptographic software called Rapid Ransomware became part of the news as the year started. This ransomware is highly malicious and strong in its built. After encrypting a device, it continues to encrypt every new file that is being created on the device, while simultaneously disabling automatic repairs. This ‘rapid’ action of this software makes it very difficult to perform the task of ransomware decrypt.

Few days ago, the group behind this ransomware launched its V2.0. Even though we are unable to notice any significant differences in its encryption module from the earlier version, nonetheless some minor digressions are there.

The most noticeable among them is the inclusion of a code that will detect the system locale of the device before launching its encryption assault. If the system locale of the attacked device is set to Russia, then the ransomware will not continue with its encryption activity on the device. This modification may be telling us about the origin of the developers of this ransomware.

Another change that can be seen in the latest version of Rapid Ransomware is a slight tweak in its method to notify the victims that their files have been locked down by a ransomware attack. In earlier versions, users got to know about the ransomware attack with the extension ‘.rapid’ added on the encrypted files. This extension also told the victims about the specific type of ransomware strain used to encrypt their files.

But in Rapid Ransomware V2.0, a long random string is generated in the extensions of encrypted files. In addition, a ransom note also appears at the top. The note warns the users against the use of third-party ransomware decrypt for the recovery of encrypted files, or else they have to suffer permanent loss of the data.

Like earlier versions, victims are still asked to get in touch to the instigators via email. According to security researches, there are chances that Rapid Ransomware V2.0 has been surfaced by accident because it is still available with unpacked source code and debugging files, which has helped researchers analyze its code.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Idle Buddy Virus: A potential Ransomware Next post Data Backups is not the Ultimate Answer to Ransomware Attacks

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.