This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
STOP is a ransomware tool first seen in December 2017.
Affected platforms
The following platforms are known to be affected:
Threat details
Some variants such as KeyPass are known to be distributed via fake installers, masquerading as legitimate software. Other variants are likely to be delivered via spam or malvertising campaigns.
Update
A new variant of STOP has been observed which appends the .rumba extension to encrypted files.
Update
A new variant of STOP has been observed which installs the AZORult trojan on infected devices.
Remediation steps
| Type | Step |
|---|---|
|
A third party decryption tool has been released for the .puma/.pumas/.pumax variant, but this has not been tested by NHS Digital. If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection:
To limit the damage of ransomware and enable recovery:
The only guaranteed way to recover from a ransomware infection is to restore all affected files from their most recent backup. |
Last edited: 17 February 2020 1:00 pm