Skip to main content

Beware of Thanatos, the latest cyber-extortion scam

Another ransomware program is infecting computers, and it’s demanding Bitcoin Cash to let users unlock their files. A report at Bleeping Computer highlights the new ransomware, dubbed Thanatos, that was unearthed by security experts at MalwareHunter Team.

What makes this particular infection noteworthy is that it creates an encrypted file, but the key is not saved anywhere. Whether by accident or design, there’s no way to easily unlock a computer once it’s been compromised. Even if you do pay the ransom, it’s unlikely the developers of the malware will ever be able to decrypt your data.

It is possible to use a brute force method to discover the encryption key, however. Users infected with Thanatos are strongly advised not to pay the ransom and instead contact a cyber security firm for assistance.

After a computer is infected, all the encrypted filename extensions are changed to .THANATOS. A ransom note in the form of a README.txt file pops up whenever the user tries to log on, demanding $200 in cryptocurrency to decrypt the files.

Thanatos is noteworthy in that it’s the first ransomware scam to accept Bitcoin Cash for payment, along with Bitcoin and Ethereum. Bitcoin Cash is a spin-off of regular Bitcoin caused by a “hard fork” in the currency, similar in practice to a stock split.

Cryptocurrency is quickly becoming the payment method of choice for online extortionists; CCN reports that 34 ransomware schemes netted $25 million over a two-year period. Most criminals were using the Bitcoin exchange BTC-e to redeem their extorted funds. BTC-e has been used to launder money in the past, and several countries have called for legal oversight of the shadowy exchange.

Bleeping Computer has an in-depth guide that outlines some steps you can take to protect your data, such as anti-ransomware security software that includes behavioral detection algorithms. We’ve also compiled an overview of some of the best free anti-virus software to help keep your computer up and running.

You’ve heard it a hundred times, but it bears repeating: Always back up your data, always update your OS to the latest version, and don’t use the same passwords for multiple applications.

Editors' Recommendations

Mark Austin
Former Digital Trends Contributor
Mark’s first encounter with high-tech was a TRS-80. He spent 20 years working for Nintendo and Xbox as a writer and…
How to build your own GPT chatbot without coding
Infinix Zero 30 5G Android phone in gold color with ChatGPT virtual assistant.

For $20 per month, a ChatGPT Plus subscription unlocks far more than just access to GPT-4. With a little know-how, you’ll actually be able to use some of OpenAI’s more advanced features to build a custom GPT chatbot all your own. We did it ourselves, and the results were simply astounding! And while this may sound like an intimidating task to undertake, you won’t even need to know any coding.

Read more
How to change your MAC address on Windows and Mac
The TP-Link Archer AXE7800 tri-band Wi-Fi 6E router in a room.

Each and every web-connected component in your household has a MAC address. One can think of these 12-digit identifiers as digital name tags that computers, smartphones, tablets, and smart TVs use to say “present” on our home Wi-Fi networks. MAC addresses are also integral in maintaining a safe and reliable gateway to the internet.

Read more
How to change where screenshots are saved on a Mac
how to change where screenshots are saved on a mac apple screenshot

With the right keyboard shortcuts, taking a screenshot on a Mac is very straightforward -- although they don't always save to the right location. Fortunately, there are a number of locations you can choose from and selecting from them is as quick and easy as taking a screenshot in the first place.

Here's how to choose where screenshots are savedon a Mac.

Read more