• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Anatova Ransomware Targets Victims Through Peer-to-Peer Networks

February 7, 2019Simeon Georgiev

Ransomware operators have been using innovative techniques to infiltrate devices. In the latest innovation, McAfee has identified a ransomware strain that uses peer-to-peer networks to target users. This cryptovirological strain goes with the name Anatova and has been active in the cyber landscape for a couple of months.

Anatova Operators Are Exploiting the Popularity of BitTorrent

Ransomware removal experts think that Anatova operators have deliberately picked a niche of users to spread their cryptovirological mischief. Peer-to-peer networks such as BitTorrent are particularly popular in computer gamers that need to download large gaming executable files. The popularity of peer-to-peer networks is unmatched because it provides free downloads for all types of files irrespective of their sizes. So, Anatova operators have covered a large user base by tailoring their infection for files available on peer-to-peer networks.

Effective Encryption Techniques Are Employed

Experts have also come to the conclusion that Anatova is not the product of any rookie effort.  The modular design and complicated encryption optimization technique used in the strain are indicative of the fact that the operators have tried their best to come up with a fail-safe encryption module. The files affected by Anatova ransomware become permanently unreadable and can only be unlocked through professional ransomware removal services or the decryption key saved with the operators.

Anatova Operators Demand Ransom in Dash

The majority of ransomware operators present their ransom demands in Bitcoins. However, some operators have switched to other cryptocurrencies because of the relatively reduced market value of Bitcoin. Moreover, the anonymity of transaction associated with Bitcoin has also dwindled in recent times.

This might be the reason why Anatova operators ask extortion in Dash, another popular cryptocurrency, for providing decrypter for ransomware removal.  According to the malware infection cases analyzed by experts at McAfee, Anatova operators demand 10 units of Dash for providing the decryption solution.

As per current exchange rate, 1 Dash equals to $204. The total extortion amount ($2,040) is quite high for people who are using free peer-to-peer services for downloading executable files. The reason why Anatova operators have picked Dash is that it has a special feature called PrivateSend, which carry out transaction mixing to make it as anonymous as possible. Other cryptocurrencies also offer such measures to ensure complete anonymity of the transactions.

Preventing Anatova Ransomware Attacks

Anatova operators use bogus executable files or infected downloads to get to the user. In order to publish bogus executable files or to hack the original ones, they use vulnerable web domains. So, never use poorly secured websites for peer-to-peer downloads. In case you have already been affected by Anatova, deal with the issue through professional ransomware removal expertise instead of engaging with the perpetrators.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Matrix Ransomware: A Growing Threat to Single Machines Next post Ransomware Hits Servers of Del Rio City Hall, Texas

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.