Truke is the name of the newly discovered Ransomware that belongs to the Djvu Ransomware Family. It is reported to have infected a large number of systems across the world so far. Infected e-mail attachments & torrent websites are the prime means using which Truke Ransomware propagates its infection.
Once the system is infected, Truke employs AES & RSA cryptography method to encrypt user & system files. It renames the files by appending “.truke” extension to the filenames & hence makes them inaccessible to the users.
Name | Truke |
Type | Ransomware |
Category | Malware |
Operating System Impacted | Windows |
Targeted Browser | Google Chrome, Internet Explorer, Mozilla Firefox |
Truke Ransomware is the recent menacing member of the giant Malware Family. It is a variant of the devious STOP (DJVU) Ransomware & has been detected to spread its infection at an alarming rate.
Truke Cryptovirus encrypts & locks the user & system data found on the impacted Hard-drive & even on the network-shared location. In order to make it arduous for the users to recover their files, Truke uses strong cryptographies such as AES & RAS. These highly-complex Encryption Algorithms require a complicated private key to decrypt the files.
The original files names are renamed by appending .truke extension to the filenames.
For example– The file name “image1.jpg” might be renamed as “image1.jpg.truke”.
The files targeted by the Truke Ransomware may include files with the extensions mentioned below-
The primary purpose behind encrypting the files is to extort money by making the victims pay Ransom for the encrypted files.
Following the encryption, Truke Virus generates a ransom note in text format named as “_readme.txt”. A Copy of this ransom note is dropped in every existing folder.
Truke Ransomware delivers a ransom-demanding note on the infected system which is in the text format & named as “_readme.txt”.
The note appears in the form of a program window & holds the title – “Attention”.
The Ransom Note for the Truke Ransomware states that the all the files are encrypted with a complex encryption method & a private key.
To purchase the decryption key, victims are required to pay a ransom amount of $980. In case, the victim contacts the hackers within 72 hours of encryption, they will receive 50% discount on the ransom amount, which is $490.
In addition to that, users are asked to contact the hackers on the e-mail address – gorentos@bitmessage.ch or ferast@firemail.cc.
The ransom note further prompts the users to send one encrypted file to the Truke’s developers, which will be restored for free & sent back to the victim as a guarantee that files can be actually decrypted.
Despite of such claims, victims are advised not to make any payment to the hackers. Research analysis has shown that the hackers usually avoid the victims once the ransom amount has been received.
It is evident that paying Ransom Amount yields no positive result; hence all the encouragements to pay ransom & contact the hackers should be ignored.
Users must ensure to regular back their data, be vigilant while visiting torrent websites & avoid clicking on the spam e-mail attachments.
The hackers behind Truke Ransomware use various techniques to propagate its infection. These may include:
1). Spam E-mail campaigns & infected attachments
2). Unreliable Third-party software download sources
3). Unofficial download sources (free file-hosting sites, P2P networks)
4). Fake Software Cracks/updaters, freeware, shareware
5). Software Bundling can download Trojans, Ransomware & other malware.
6). By visiting questionable torrent websites & other malware-laden sites
To restart the system to Safe Mode with Networking, if already switched ON then follow the below steps:
5 Click on the username and enter the password (if any).
OR
OR
Continue to follow steps 4 & 5 of Method 2 to restore the System Files and settings.
Hits: 137
Subscribe to our newsletter today to receive updates on the Latest News and Threats.
Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.