• Researchers have spotted a new ransomware strain dubbed AnteFrigus that displays unusual characteristic traits.
  • It targets only the drives that are associated with removable devices and mapped network drives.

A new Hookads malvertising campaign has been discovered to be distributing the AnteFrigus ransomware.

What is unusual?

Most ransomware target the C: drive on target Windows devices, but not AnteFrigus. Instead, it goes after the drives associated with removable devices and mapped network drives.

  • This is unusual as users save documents on their local drives.
  • It targets only the D:, E:, F:, G:, H:, and I: drives and does not encrypt any files in the C:.
  • However, security experts speculate that this may be a bug and not the intended behavior.
  • They also suggest that this ransomware may still be in the development or testing phase.

“This malware does not look super sophisticated and contained a plethora of debugging symbols, source references, and test/debug location,” security researcher Vitali Kremez told Bleeping Computer.

What we know

This ransomware is distributed by malvertising campaigns that redirect potential victims to the RIG exploit kit.

  • This exploit kit looks for Internet Explorer vulnerabilities to exploit and install a malicious payload.
  • The ransomware was found to append a random extension to the encrypted files.
  • The ransom notes displayed a link to a Tor payment site that contained the ransom amount and the bitcoin address to send it to.
  • The C:\qweasd\test.txt file is also created, which may be used as a debug or lock file.

What we don’t know

Because this is a new ransomware, its weaknesses are not yet known. Researchers will have to uncover the malware’s weaknesses to develop a decryptor.

Cyware Publisher