Scarab Ransomware- Another Strain Strikes Cyber World



Firstly discovered in June 2017, the infamous Scarab Ransomware made its major comeback on 22nd August 2019. This new found Scarab variant encrypts the targeted file extensions by employing highly-complex Encryption Algorithms – AES-256 & RSA-2048. It then appends the file names with .dom extension. Once the files are encrypted, it drops a ransom-demanding note, “How to decrypt files.txt” in every folder that contains Scarab files.

Scarab Ransomware

Numerous other versions that are spreading at an alarming rate around the world include Scarab-Recovery, Scarab-Turkish, Scarab-Barracuda & .anonimus.mr@yahoo.com. The victims are looking for ways to remove Scarab ransomware from their system & recover the encrypted files.

Let us take an insight into the threat behaviour of Scarab & tips to protect your system against its attack.

The Ever-Evolving Threat to Cyber World – Ransomware

Ransomware has been a prominent threat to enterprises & individuals alike since the beginning of 21st century. Ransomware-based malicious programs definitely represent the worst cyber threat that you can possibly encounter in the current scenario.
This crypto-viral extortion began to soar in popularity with the growth of crypto-currencies such as Bitcoin, Ethereum, Litecoin and Ripple. Digital currencies leverage encryption techniques to verify and secure transactions. This encouraged threat actors to make this problem reach epidemic proportions.

One such vicious malware designed to extort money from its victims is Scarab Ransomware. It was first discovered in June, 2017. Since the inception of this menace, amateur con artists have spawned myriad threat variants to swindle users.Following its discovery, multiple variants of this ransomware have appeared on the threat landscape.

Recent research revealed that over the last two years, malware attackers have received a whopping $25 million in ransoms.


Comments

Popular posts from this blog

How to remove Speedtest-guide.com redirect from your system

The novel DNS protocol helps Mozart Malware evade detection

How to remove ZUpdater.exe Trojan from your system?