It is unusual for sure as it so occurred
interestingly in the historical backdrop of Ransomware swarming the home
systems of the users that the face of a former Leader of a nation was taken up
as the brand of a malware.
Truly, first tweeted by the MalwareHunterTeam, this
ransomware has the peculiar title of,
"Barack
Obama's Everlasting Blue Blackmail Virus"
This Windows-based malware is distributed through
spam and phishing efforts with the aim to initially examine an infected system
for processes related with antivirus solutions.Whenever executed, this ransomware is capable of
terminating different procedures related with antivirus programming, for
example, Kaspersky, McAfee, and Rising Antivirus.
The Obama ransomware then scans for documents ending
with .EXE, before encoding them. It’s done as such that the registry keys
related with the executable records are likewise influenced which thusly helps
for instigating the virus each time an .EXE document is introduced and
launched.
The message in the ransomware interface is shown
alongside a picture of the previous US President Obama which states that users
should contact the attacker at the mail 2200287831@qq.com for payment
related directions.
Hello,
your computer is encrypted by me! Yeah, that means your EXE file isn't open!
Because I encrypted it.
So
you can decrypt it, but you have to tip it. This is a big thing. You can email
this email: 2200287831@qq.com gets more information.
The Ransomware more often than not encodes content,
like documents and media to force victims to pay a blackmail 'expense' to
recover their records and files and is distinguished by 45 out of 68 antivirus
solutions, as indicated by VirusTotal, a virus scanning service.
Cybersecurity firms however prescribe for the
affected users to not surrender in and pay if their system is infected with
ransomware and for that they have even begun releasing free decoding keys
consistently.