Extreme Hacking
Advanced Ethical Hacking Institute in Pune

Tox Ransomware is malware which encrypts your hard drive and demands money in exchange for decryption. After CTB-Locker, Teslacrypt, CryptoWall, Cryptolocker and TorrentLocker, Tox is the new ransomware on the block. Tox is set up as a Ransomware-as-a-service where Tox developers take 20% of the paid ransoms. Tox (or toxicola ransomware) is only accessible over the TOR network and bitcoin is used for pay-outs which keeps users kind of ‘anonymous’. Since it does not require any technical knowledge to set up this ransomware it is expected to be exploited by many users.

Tox Ransomeware is a free ransomware-as-a-service kit, easy to set-up because no technical knowledge is required. Access and virus creation through TOR network, no contact details for registration, pay-outs using bitcoin and Tox takes a 20% cut of the ransom. This is a great formula that will lead us to one thing: Trouble!

Tox Ransomeware creation

Tox ransomware can be easily created on a TOR union website by signing up with just a name and password.

Tox Ransomware 1

Than completing a form which contains a message, ransom fee and a note.

Tox Ransomware 2

And the final step is to download the Tox Ransomeware virus and it is ready to spread. The output file looks like a regular Microsoft Office Word document and has a .src extension. When the document is opened by the victim the virus will encrypt your hard drive, download and install Curl and TOR. All downloaded files will be stored in the following path: C:\Users\AppData\Roaming\

After execution, Tox Ransomware will start TOR in SOCKS5 proxy mode.

Tox Ransomware 3

How to protect yourself

  • Make regular back-ups of your data.
  • Do not open attachments or files from an unknown source.
  • Keep your antivirus up-to-date.
  • Scan for Malware on a regular basis.
  • Browse internet safely.

Tox Ransomware removal

In this tutorial we will be infecting ourselves with Tox ransomware and remove it afterwards using AntiMalwareBytes. Please note that decrypting your files will be very hard and is not covered in this tutorial, just removal for preventing further damage. Watch below video for a step-by-step tutorial on how to remove Tox Ransomware using MalwareBytes.

www.extremehacking.org
CEHv8 CHFIv8 ECSAv8 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE,Certified Ethical Hacking, Center For Advanced Security Training in India,IT Security Training Information Security Traning Courses in Pune, ceh certification in pune, Ethical Hacking Course in Pune