Hhaz Ransomware Locks Victim Systems

ransomware

In our examination of new malware samples, we identified Hhaz as a ransomware variant linked to the Djvu family. Our investigation revealed that Hhaz encrypts data, modifies filenames by appending the ".hhaz" extension, and generates a text file named "_readme.txt" containing a ransom note.

To illustrate Hhaz's file renaming behavior, it changes "1.jpg" to "1.jpg.hhaz," "2.png" to "2.png.hhaz," and so on. Djvu ransomware is notably associated with information stealers.

The ransom message assures the targeted individual that locked files, encompassing images, databases, and documents, can be restored by obtaining a decryption tool and a specific key. As proof of possessing the decryption tools, the attackers offer the decryption of just one file for free, provided it lacks valuable information.

The decryption cost is set at $980, with a 50% discount available if victims contact the threat actors within a 72-hour timeframe. The note emphasizes the absolute impossibility of data recovery without making the specified payment. Victims are told to contact the ransomware operators via email at either support@freshmail.top or datarestorehelpyou@airmail.cc.

Hhaz Ransom Note in Full

The complete text of the ransom note produced by Hhaz reads as follows:

ATTENTION!

Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
hxxps://we.tl/t-5zKXJl7cwi
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:
support@freshmail.top

Reserve e-mail address to contact us:
datarestorehelpyou@airmail.cc

Your personal ID:

How is Ransomware Like Hhaz Distributed Online?

Ransomware like Hhaz is typically distributed through various online channels using tactics designed to exploit vulnerabilities and trick users. Here are common methods employed for the distribution of ransomware:

Malicious Email Attachments:
Cybercriminals often use phishing emails to distribute ransomware. These emails may contain seemingly harmless attachments, such as documents or PDFs, which actually carry the malicious payload. Opening these attachments can trigger the ransomware installation.

Infected Websites and Malvertisements:
Visiting compromised websites or clicking on malicious online advertisements (malvertisements) can expose users to ransomware. Attackers may exploit vulnerabilities in web browsers or plugins to deliver the ransomware payload.

Exploit Kits:
Exploit kits are tools that target software vulnerabilities to deliver malware. Cybercriminals can use exploit kits on compromised or malicious websites to automatically exploit vulnerabilities in the visitor's software and deploy ransomware.

Remote Desktop Protocol (RDP) Attacks:
Cybercriminals may attempt to gain unauthorized access to systems through weak or compromised Remote Desktop Protocol connections. Once inside, they can deploy ransomware directly on the targeted system.

Malicious Links in Emails or Messages:
Ransomware can be distributed through links in emails, instant messages, or social media. Clicking on these links may lead to the download and execution of malicious files that install the ransomware on the user's device.

Watering Hole Attacks:
In watering hole attacks, cybercriminals compromise websites that are regularly visited by a specific target group. By infecting these websites, they can deliver ransomware to the target audience.

How To Fix, Stop, & Remove HHAZ Ransomware To Prevent File Encryption

December 11, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.