Ransomware operators have been using innovative techniques to infiltrate devices. In the latest innovation, McAfee has identified a ransomware strain that uses peer-to-peer networks to target users. This
Anatova Operators Are Exploiting the Popularity of BitTorrent
Ransomware removal experts think that Anatova operators have deliberately picked a niche of users to spread their cryptovirological mischief. Peer-to-peer networks such as BitTorrent are particularly popular in computer gamers that need to download large gaming executable files. The popularity of peer-to-peer networks is unmatched because it provides free downloads for all types of files irrespective of their sizes. So, Anatova operators have covered a large user base by tailoring their infection for files available on peer-to-peer networks.
Effective Encryption Techniques Are Employed
Experts have also come to the conclusion that Anatova is not the product of any rookie effort. The modular design and complicated encryption optimization technique used in the strain are indicative of the fact that the operators have tried their best to come up with a fail-safe encryption module. The files affected by Anatova ransomware become permanently unreadable and can only be unlocked through professional ransomware removal services or the decryption key saved with the operators.
Anatova Operators Demand Ransom in Dash
The majority of ransomware operators present their ransom demands in Bitcoins. However, some operators have switched to other cryptocurrencies because of the relatively reduced market value of Bitcoin. Moreover, the anonymity of transaction associated with Bitcoin has also dwindled in recent times.
This might be the reason why Anatova operators ask extortion in Dash, another popular cryptocurrency, for providing decrypter for ransomware removal. According to the malware infection cases analyzed by experts at McAfee, Anatova operators demand 10 units of Dash for providing the decryption solution.
As per current exchange rate, 1 Dash equals to $204. The total extortion amount ($2,040) is quite high for people who are using free peer-to-peer services for downloading executable files. The reason why Anatova operators have picked Dash is that it has a special feature called PrivateSend, which carry out transaction mixing to make it as anonymous as possible. Other cryptocurrencies also offer such measures to ensure complete anonymity of the transactions.
Preventing Anatova Ransomware Attacks
Anatova operators use bogus executable files or infected downloads to get to the user. In order to publish bogus executable files or to hack the original ones, they use vulnerable web domains. So, never use poorly secured websites for peer-to-peer downloads. In case you have already been affected by Anatova, deal with the issue through professional ransomware removal expertise instead of engaging with the perpetrators.