SHARE
Facebook X Pinterest WhatsApp

New Strains of Ransomware Show New Tactics

5 Security Steps to Protect Users from Ransomware A new variant of ransomware shows just how low and dirty malware developers are willing to get. Even the name is offensive. When Hitler-Ransomware (yes, that’s the name) infects a computer, it locks the screen with a picture of Hitler and the phrase, “This is Hitler-Ransonware” (sic) […]

Written By
SP
Sue Poremba
Aug 11, 2016
Slide Show

5 Security Steps to Protect Users from Ransomware

A new variant of ransomware shows just how low and dirty malware developers are willing to get. Even the name is offensive. When Hitler-Ransomware (yes, that’s the name) infects a computer, it locks the screen with a picture of Hitler and the phrase, “This is Hitler-Ransonware” (sic) in a black box and tells you that your files have been encrypted. The screen goes on to direct the victim how to pay the ransom to recover the encrypted files.

But here is the cruelest part to this ransomware strain: It doesn’t encrypt files. It deletes them. As Stephen Brown, director of Product Management with LANDESK, said in an email comment, this new ransomware presents two new approaches: offensive presentation and destroying files that doesn’t involve encryption. He went on to state:

Using an image of an offensive figure creates immediate negative emotions which, compounded by the ransom demand, is more likely to trigger irrational responses. Part of ransomware’s power is fear ­ the fear of loss of personally valuable files.

Brown added that the lack of encryption could mean that the developer was either lazy or inept. In lieu of encryption, the user is given an hour’s warning to pay the ransom and when that doesn’t happen, the malware simply crashes the computer and begins the deletion process on the reboot.

The ransomware appears to be German in origin because some of the code in the malware is in German. In fact, that code string translates to “This is a test.” It’s why there are concerns that a more mature and more dangerous version will be showing up soon.  

If the Hitler images mock the fear and disgust most of us have for ransomware, what do cat pictures do? McAfee recently discovered a new strain of ransomware targeting Android devices. It is dubbed El Gato because it uses a cat picture to lock the screen while in the background the malware is encrypting the files on the SD card. As Computerworld explained:

Once El Gato, Spanish for ‘the cat,’ is installed, the attacker can control the ransomware and send commands to the Android via a web-based control panel. McAfee Labs researcher Fernando Ruiz said the malware runs on a legitimate cloud service provider and has botnet capabilities. The kicker is that the malware uses AES encryption with a hardcoded password, making decryption ‘trivial.’

Like Hitler-Ransomware, El Gato is likely in its testing phase. It shows us that ransomware is still evolving and cybercriminals continue to come up with new tactics that play off of fear or naiveté of users. 

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom’s Guide. You can reach Sue via Twitter: @sueporemba.

Save

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.