Backup & Recovery

Thanatos Ransomware Makes Data Recovery Impossible

There are many applications that do not follow proper testing practices before their release and then fall prey to various ransomware. Moreover, ransomware developers are constantly coming up with new ideas to hijack your devices. Such is a new and wild ransomware that attacks your computers in a unique way. A ransomware named as Thanatos generates different encryption keys for different files but never stores them anywhere, making data recovery futile. Thanatos was initially identified by the experts of MalwareHunter.

How Does Thanatos Ransomware Works?

When Thanatos infects a device, it encrypts every file with a unique key but doesn’t save the key anywhere. Therefore, even after paying ransomware, you may not be able to decrypt your files.

Thanatos malware changes the file extension to ‘. THANATOS’ for every file. It also tracks the total number of infected devices by connecting to a particular URL (iplogger.com/1t3i37) that reports about the count of the victims to the attacker. Everytime the user tries to access the computer, he or she is notified with a message that instructs him/her to pay a ransom of $200 to a crypto-coin address. The victims are asked to contact the hacker through email to collect the decryption software. Victims are asked to pay the ransom in BitCoin Cash, Ethereum and BitCoin.

Image source: – mspsteem.com

Note: –  Thanatos becomes the first ransomware ever to allow victims to pay in BitCoin Cash.

However, according to security expert Francesco Muroni, brute force algorithm might be applied to the encryption keys to commonize the file formats of all the files. The process is time-consuming but provides with a regular file type that contains a familiar magic header.

See Also: Various Ways To Protect Your PC Against Ransomware

How To Safeguard Your Devices Against Thanatos Ransomware

To secure your devices against Thanatos, best security practices should be followed. Always backup your data at a different place other than your device. hence, at times when your device is compromised like a ransomware attack, you can implement this backup to restore your important files. You can use Right Backup to automatically store your data on cloud. It is the most secure and easiest way to back up your data. With Right Backup, you can restore all your precious data in one click. Right Backup supports all major operating systems like Windows, macOS, iOS and Android. Click on the button to download Right Backup.

Again, install an antimalware program in your devices in order to perform behavioral and signature detections.

Other than these points, also follow these best practices for exhaustive security: –

Applying these points into practice, you can efficiently secure your data and stop grave ransomware attacks like Thanatos on your system. We hope that the article helps you to shield your system against Thanatos. For further help, talk with us in the comment section.

Next Read: Techniques To Protect Your Mac Against Ransomware Attack

Leave a comment