Being hit by ransomware is a nightmare that all users should be scared of. Unfortunately, many ransomware victims have come to the conclusion that crypto malware works faultlessly and continues to affect thousands of users and enterprises on a daily basis.
|Name||Help recover files.txt .oorr|
|Type||Ransomware, Trojan Ransomware|
|Short Description||The ransomware encrypts files and demands payments for exchange of their decryption.|
|Symptoms||Files are encrypted and have the ‘.oorr’ prefix.|
|Distribution Method||Most likely – via backdoor access. Other options – exploit kits, spam, etc.|
|Detection tool||Download Malware Removal Tool, to See If Your System Has Been Affected By Help recover files.txt .oorr|
We have already seen Trojan-Ransom.NSIS.ONION.air being active in the wild, and apparently, the crypto threat is set to operate once again. Malware researchers suspect that a ransomware currently known as ‘Help recover files.txt’ is yet another variation of the Onion ransomware.
According to our research, files encrypted by Help recover files.txt/ Trojan Ransom.NSIS.ONION.air will have the oorr. prefix.
Recent information on the ransom threat reveals that the current targets are located in Bulgaria and Greece. Other neighboring countries may also be chosen by the ransom authors. Targets can be both regular users and business networks. In this article, we will try and shed a light on how the ransomware works and how to stay protected against it in the first place.
Help recover files.txt / Trojan-Ransom.NSIS.ONION.air Technical Review
If your files (videos, text documents, pictures, etc.) all have the oorr. prefix, and you also see a Help recover files.txt message, you have been hit by Trojan-Ransom.NSIS.ONION.air ransomware.
Research reveals that the ransomware enters the system with the help of backdoor access. As we have already written, the Onion ransomware is also known as CTB-Locker or Citroni. Our previous research indicates that Critoni’s services could be rented by third parties at a cost of $ 3 000. File-encrypting threats are being sold in underground forums as we speak. Anyone with even the slightest knowledge of malware can ‘rent’ a file-encrypting service and make quick money out of thin air. Sadly, ransomware has proven to be a most effective way to generate online income.
Get to know the method employed by professional and wannabe cyber criminals and read our article
Now, let’s get back to the Help recover files.txt ransom. The message displayed by the threat contains the following information:
→”Hi,What happened to your files?mAll your files were protected by a strong encryption with RSA-2048 More information about the encryption keys using RSA-2048 can be found heres https://en.wikipedia.org/RSA What does this mean? This mean that the structure and data within your files have been irrevocably change and only we can help you to restore it. How did this happen? Especially for you, on our server was generated the secret key pair RSA-2048 – public and private. All your files were encrypted with the public key, which has been transferred to your computer via internet. Decrypting of your files is only possible with the help of the private key and decrypt program which is on our server. You can buy our tool with private key that will recover all your files. It cost’s 4 bitcoins and you need send it to bitcoin address 14mf7A1oCZ7bjpkqaoXCHp2VLRhuv***** . 1 bitcoin ~= 240 US $.You can make bitcoin payment without any bitcoin software. For this you can use one of this bitcoin exchanger from this exchange list to send us bitcoins (addresses listed). Our contact mail firstname.lastname@example.org . Additional contact mail email@example.com (email us here if we don’t answer from gmail.com). Your own personal key: J******* . Send us your own personal key after payment and we will send you decryption tool.You can send one small file (not bigger than 1 megobyte) before payment and we will recover it. It will be proof that we have decryption tool.”
Keep in mind that this message can be translated in accordance to the victim’s location and nationality. Another variable is the listed bitcoin addresses – they could vary from victim to victim. However, they are all traced back to the same attacker, with the same email addresses. Here is an image of the message in English:
According to one of the emails given by the criminals, the team may be situated in India. However, more information is needed to confirm that.
As already stated, the files encrypted by the ransomware start with a prefix ‘oorr’, followed by the original file names. Users have reported that the malicious threat affects not only the system files but also the backup drive and DropBox.
Where in the system is the ransomware hiding?
The locations typically used by ransomware are:
However, one user of BleepingComputer has shared that he found the executable in the following directory:
Local Disc (C:)\Users\
The user believes that the hackers could have broken his system using Remote Desktop Connection. One way they could have done that is by brute-forcing his password.
And now the logical question is…
How Can I Rid of Help recover files.txt / Onion Ransomware and Restore My Files?
As stated by affected users, several well-known AV solutions have failed in detecting and blocking the attack. If an AV solution is applied, it should be quite a powerful one, specialized in removing sophisticated malware.
We have already written a detailed article about the RSA encryption algorithm and how to deal with it in case of infection. Just follow the link below:
Restore Files Encrypted via RSA Encryption
To improve the protection against ransomware, security experts recommend using 2 external drives and back up files on a daily or a weekly basis. For precautionary reasons, the second hard drive should be kept offline.
Another thing to be tried is following the guide below. Please don’t hesitate to contact us if you have any questions. STF also welcomes all users or security experts that can help in the battle against ransomware and file-enryption. You can either use the comment field below the article, or, even better, you can join our security forum and start your own topic.
1. Start Your PC in Safe Mode to Remove Help recover files.txt .oorr.
For Windows XP, Vista, 7 systems:
1. Remove all CDs and DVDs, and then Restart your PC from the “Start” menu.
– For PCs with a single operating system: Press “F8” repeatedly after the first boot screen shows up during the restart of your computer. In case the Windows logo appears on the screen, you have to repeat the same task again.
– For PCs with multiple operating systems: Тhe arrow keys will help you select the operating system you prefer to start in Safe Mode. Press “F8” just as described for a single operating system.
3. As the “Advanced Boot Options” screen appears, select the Safe Mode option you want using the arrow keys. As you make your selection, press “Enter“.
4. Log on to your computer using your administrator account
While your computer is in Safe Mode, the words “Safe Mode” will appear in all four corners of your screen.
For Windows 8, 8.1 and 10 systems:
Step 1: Open the Start Menu
Step 2: Whilst holding down Shift button, click on Power and then click on Restart.
Step 3: After reboot, the aftermentioned menu will appear. From there you should choose Troubleshoot.
Step 4: You will see the Troubleshoot menu. From this menu you can choose Advanced Options.
Step 5: After the Advanced Options menu appears, click on Startup Settings.
Step 6: Click on Restart.
Step 7: A menu will appear upon reboot. You should choose Safe Mode by pressing its corresponding number and the machine will restart.
2. Remove Help recover files.txt .oorr automatically by downloading an advanced anti-malware program.
To clean your computer you should download an updated anti-malware program on a safe PC and then install it on the affected computer in offline mode. After that you should boot into safe mode and scan your computer to remove all Help recover files.txt .oorr associated objects.
Security engineers recommend that you back up your files immediately, preferably on an external memory carrier in order to be able to restore them. In order to protect yourself from Help recover files.txt .oorr (For Windows Users) please follow these simple steps:
For Windows 7 and earlier:
1-Click on Windows Start Menu
2-Type Backup And Restore
3-Open it and click on Set Up Backup
4-A window will appear asking you where to set up backup. You should have a flash drive or an external hard drive. Mark it by clicking on it with your mouse then click on Next.
5-On the next window, the system will ask you what do you want to backup. Choose the ‘Let Me Choose’ option and then click on Next.
6-Click on ‘Save settings and run backup’ on the next window in order to protect your files from possible attacks by Help recover files.txt .oorr.
For Windows 8, 8.1 and 10:
1-Press Windows button + R
2-In the window type ‘filehistory’ and press Enter
3-A File History window will appear. Click on ‘Configure file history settings’
4-The configuration menu for File History will appear. Click on ‘Turn On’. After its on, click on Select Drive in order to select the backup drive. It is recommended to choose an external HDD, SSD or a USB stick whose memory capacity is corresponding to the size of the files you want to backup.
5-Select the drive then click on ‘Ok’ in order to set up file backup and protect yourself from Help recover files.txt .oorr.
Enabling Windows Defense Feature:
1- Press Windows button + R keys.
2- A run windows should appear. In it type ‘sysdm.cpl’ and then click on Run.
3- A System Properties windows should appear. In it choose System Protection.
5- Click on Turn on system protection and select the size on the hard disk you want to utilize for system protection.
6- Click on Ok and you should see an indication in Protection settings that the protection from Help recover files.txt .oorr is on.
Restoring a file via Windows Defense feature:
1-Right-click on the encrypted file, then choose Properties.
2-Click on the Previous Versions tab and then mark the last version of the file.
3-Click on Apply and Ok and the file encrypted by Help recover files.txt .oorr should be restored.
Spy Hunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter