Ransomware attacks have grown with the advent of the modern connected world and Today it has become one of the major headaches for online businesses of all types. In the recent past, Ransomware attacks have expanded to include data exfiltration, participation in distributed denial of service attacks (DDOS) & anti-detection components.
Recently a series of Scarab Ransomware variants were released that dominated Ransomware distribution. The malicious program employs sophisticated AES-256 & RSA-2018 encryption algorithm to lock personal information on targeted systems. The Ransomware belongs to hidden tear Ransomware family.
Scarab Ransomware was spotted for the first time in June 2017 & since then has been reappearing with new versions. Amongst the many variants of this Ransomware the updated ones encrypt files by appending it with .RAP, .zzzzzzzz, .krab, .fast, .key, .ERROR, .skype, .hitler, .mammon, .walker, .please, .Recovery, .red, .osk, .email@example.com, .bomber etc. The list of scarab Ransomware variants is endless.
Scarab Ransomware is no ordinary Ransomware as it uses Necurs botnet to spread around. The popularity & imperilment of this spam botnet largely intensifies the possibility of getting infected with this malice. The targeted files of this Ransomware attack include:
Unlike other Ransomware attacks, this Scarab Virus soon after encryption places HOW TO RECOVER ENCRYPTED FILES ransom note in each of the affected folders. The ransom note is usually in Russian language but the latest variants use the English translation of the Russian note without correct grammar. The note informs users that the files have been encrypted & contain details about the ransom to be paid along with the contact details of the attacker. The ransom note reads as:
The threat actors of Scarab File Virus usually demand $300 to $500 in exchange for the Scarab Decrypter key to unlock the encrypted data. They use different email address to communicate with Scarab virus victims. These include:
Ransomware attacks usually result in deletion of files regardless of whether or not the payment is made. Agreeing to pay to cyber maniacs hence reaps no fruits. Victims are therefore recommended to try some other ways to recover the lost data instead of paying to the hackers.
|Symptoms||User’s files are encrypted. All locked files are appended with various different extensions like .RAP, .zzzzzzzz, .krab, .fast depending on the Ransomware variant.|
|Removal||Download Removal Tool|
Scarab- krab & Scarab- Zzz are customized versions of the Scarab Ransomware Trojan released on January 12th& January 14th, 2019 respectively.
The sacarb-krab Ransomware is known to be used in attacks on small businesses that use poorly protected remote desktop accounts & outdated software infrastructure. The Ransomware remove the System Restore points & the Shadow Volume snapshots on the infected devices making the recovery possible only through third-party backup solutions. The encrypted files receive the .[[firstname.lastname@example.org]].krab extension.
The Scarab- Zzz Ransomware is similar to its other variants & uses identical ransom note. The rename pattern include .zzzzzzzz extension. For instance, a file named test.docx is renamed to 3RvbmV5d29vZCBwYXBlciBtaWxsLmRvY3gNCg==.zzzzzzzz. The threat actors appear to use ‘email@example.com‘ and ‘firstname.lastname@example.org‘ email accounts for reaching out to victims.
Other traits of these Ransomware variants resemble its earlier versions. The targeted files include images, audio, video, databases, and office documents.
Scarab Ransomware in order to appear legitimate uses various techniques to dupe users. It is usually distributed via spam email attachments. Detailed ways for this Ransomware proliferation is described as follows:
Once the system starts, ensure to use an account with administrative privilege to access Safe Mode with Command Prompt.
After the user enters admin credentials, Command prompt window is displayed wherein you are entitled to enter the below commands:
Continue to follow steps 4 & 5 of Method 2 to restore the System Files and settings.
Prevention is always better than cure and this is cent percent true for the safety in the current digital world. Below are some of the tips for you to prevent and get rid of Scarab ransomware and to protect yourself from Ransomware attacks.
Subscribe to our newsletter today to receive updates on the Latest News and Threats.
The researchers at Virus Removal Guidelines are dedicated to track down the latest vulnerabilities which may infringe your system security. Our team of expert performs a detailed research about every malware infection before educating our users about the same.
Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.