• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Do Not Sell My Personal Information
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Months-old ransomware re-emerges with new name and cheaper decryption fee

Updated on Apr 28, 2016 by Guest Authors

Just when you think the 7ev3n ransomware is done with you after it locked out users from their computers in January, the malware has resurfaced after months of hibernation, but with a new name and a lower fee for the decryption key.

According to security researchers at Bleeping Computer, the new variant of the 7ev3n ransomware, dubbed 7ev3n-HONE$T, has just come back into view locking users out of their documents and files and demanding 1 Bitcoin in ransom payment, equivalent to $400. Back in January, the ransomware would ask its victims to pay 13 Bitcoins (equivalent to more than $5,000), but the tactic might not have scared enough victims to pay for its hefty price.

ransomware

A crypto-malware by nature, the ransomware has already targeted a great number of victims and encrypted their documents since its inception in January, converting the files with the .R5A extension and renaming them. It is also difficult for any Windows recovery tool to recoup the files because the ransomware creates a file that paralyzes all of the recovery methods in Windows computers.

But if you think that all you have to do is to pay the ransom demanded by the attackers, you might be mistaken. According to security researchers who had plenty of time observing the ransomware’s behavior, the 7ev3n ransomware continues to prolong the agony of its victims by requiring the victim to recover the deleted Windows recovery options by reinstalling the Windows disc. The victim must also wipe all the installed ransomware files from the computer and perform an antivirus scan on the infected machine.

As of now, little is known about the new variant of the 7ev3n ransomware. All that the security researchers have so far established is that the modified ransomware still employs a process of encrypting files and documents that is similar to the original version. However, the security experts could not tell how the ransomware is being spread and what, if any, malicious files are installed in a computer in the event of an attack.

Some tech pundits also assume that the source code for the original version of the ransomware has been leaked in the wild, giving other cyber crooks the opportunity to take advantage of the situation and create their own version of the ransomware, which can also explain for the cheaper ransom demand.

At any rate, the best way to avoid falling for this ransomware and other forms of attack is to ignore suspicious email attachments and to always implement software updates.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

SwitchBot Lock Review – Perfect Smart Lock for Renters

BREEZOME JH03 vs JH04 Air Purifier – Which One Should You Buy?

SwitchBot Curtain Smart Electric Motor Review – The Upgraded Version

COLORWING M08F Portable Thermal Printer Review – Requiring No Ink, Toner, or Ribbon

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Premiere of the Demo of “EVOLUTION”, Tencent’s First Native Cloud Game, Leading Us to Set Off to the Real World Together
  • VANKYO Leisure 495W and Leisure 470 Pro Projector – New Full-HD Projector Series
  • SwitchBot Lock Review – Perfect Smart Lock for Renters
  • BLUETTI Father’s Day Deals – Power Gears for the Best Dad in the World

Copyright © 2022 · All Rights Reserved