Andrianov Ransomware is Another Chaos Clone

ransomware

A new ransomware variant based on Chaos ransomware has been discovered by researchers.

Named Andrianov, it encrypts data and changes filenames of all encrypted files, as well as the desktop wallpaper. It appends a unique extension to each file, such as ".1iyT6bav7VyWM5". Victims are informed that their personal files have been locked with a unique key stored on a secret server and the only way to restore access is to pay for the private decryption key.

The ransom note warns against attempting to remove the encryption software, which may cause permanent data loss. To recover their files, victims must pay $200 in Bitcoins to the provided wallet address and contact the attackers via email (leonid.andrianoviaa@mail.ru).

The complete Andrianov ransom note

The complete text contained inside the "andrianov.txt" ransom note produced by the ransomware goes as follows:

Your Personal Files has been Encrypted and Locked
Your documents, photos, databases and other important files have been encrypted with strongest encryption and locked with unique key, generated for this computer.
Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key.
Caution: Removing of Blackhat will not restore access to your encrypted files.
Frequently Asked Questions
What happened to my files ? understanding the issue
How can i get my files back ? the only way to restore your files
What should i do next ? Buy decryption key
Now you have the last chance to decrypt your files.

  1. Buy Bitcoin (hxxps://blockchain.info)
  2. Send amount of 200 dollar to address: to 17CqMQFeuB3NTzJ2X28tfRmWaPyPQgvoHV
  3. Transaction will take about 15-30 minutes to confirm.
  4. When transaction is confirmed, send email to us at leonid.andrianoviaa@mail.ru
    Click here to restore and recovery your files

The Andrianov ransomware also changes the desktop wallpaper to contain a brief message from the hackers in both Russian and English, telling the victim files are encrypted and the ransom demands are inside the text file named "andrianov.txt".

How can ransomware similar to Andrianov get on your system?

Ransomware similar to Andrianov can get on your system in a variety of ways, including through malicious email attachments, malicious links, and drive-by downloads. It is important to be vigilant when browsing the internet and opening emails from unknown sources. Additionally, it is important to keep your computer's operating system and software up-to-date with the latest security patches. Finally, using an antivirus program with real-time protection can help prevent ransomware from infecting your system.

Why you should not pay ransom to hackers operating ransomware malware similar to Andrianov?

You should not pay ransom to hackers operating ransomware malware similar to Adrianov because there is no guarantee that they will actually provide you with the decryption key. Additionally, paying the ransom only encourages these criminals to continue their malicious activities and puts other victims at risk. Furthermore, it may be illegal in some jurisdictions to pay a ransom. Finally, paying the ransom does not guarantee that your data will be recovered or that your system will be secure from future attacks.

February 9, 2023
Loading...

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.