Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
JanaWare Ransomware Targets Turkish Users with Adwind RAT

JanaWare Ransomware Targets Turkish Users with Adwind RAT

Posted on April 20, 2026 By CWS

A novel ransomware variant, dubbed JanaWare, has been discreetly impacting individuals and businesses in Turkey. The ransomware employs a tailored version of the Adwind Remote Access Trojan (RAT) to infiltrate systems, marking a significant threat to digital security in the region.

JanaWare’s Targeted Approach

This ransomware campaign is distinct due to its geographic specificity, moderate ransom demands, and sophisticated evasion tactics that have enabled it to elude detection for an extended period. The attack is initiated through a phishing email containing or linking to a harmful Java Archive (JAR) file hosted on Google Drive.

Upon engaging with the link via Outlook, Chrome automatically accesses the Drive URL, downloading the malicious file that executes on the victim’s computer. This integration of trusted applications deceives both users and fundamental security systems, facilitating the initial infection phase.

Technical Insights and Research Findings

The Acronis Threat Research Unit (TRU) uncovered this threat after analyzing Adwind-based breaches in Turkish systems. Their findings indicated that the Adwind RAT samples involved in this campaign carried additional modules and scripts, not found in earlier versions of the RAT.

The detailed study by Acronis TRU experts Jozsef Gegeny and David Catalan Alegre revealed that JanaWare has been operational since at least 2020, with confirmation that its command-and-control infrastructure remained active as of late 2025.

Operational Tactics and Evasion Techniques

JanaWare functions as a ransomware module dispatched by the Adwind RAT post-compromise. Upon file encryption, it places a Turkish-language ransom note in multiple directories with the prefix “ONEMLI NOT,” translating to “Important Note.” The ransom demands range from $200 to $400 USD, a strategy aimed at securing swift payments from less prepared victims.

All communication during the encryption stage occurs via the Tor network, ensuring anonymity. Victims are instructed to contact attackers through qTox or a designated .onion site, complicating law enforcement efforts.

Defensive Measures and Future Outlook

JanaWare’s evasion strategy includes checking system locale and IP geolocation to confirm Turkish settings before proceeding. This restricts the ransomware’s visibility to international researchers and automated sandboxes.

The malware employs Java obfuscators, Stringer and Allatori, to complicate code analysis and includes a FilePumper class to modify its own JAR archive, creating unique file signatures.

To mitigate JanaWare’s risk, it is advised to limit Java Runtime Environment execution and block untrusted JAR files. Email gateways should scrutinize messages with Google Drive links, and network monitoring should detect connections to known C2 infrastructure. Regular offline backups and reporting any incidents to national CERT or law enforcement are crucial protective steps.

Cyber Security News Tags:Acronis, Adwind RAT, cyber threat, Cybersecurity, Encryption, Google Drive, JanaWare, Java obfuscation, Java Runtime Environment, Malware, Phishing, PowerShell, Ransomware, Tor network, Turkey cyber attack

Post navigation

Previous Post: Hackers Exploit Intel Utility for Covert Malware Deployment
Next Post: Microsoft Teams Outage: Desktop Client Update Rollback Efforts

Related Posts

Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users Cyber Security News
CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability Cyber Security News
Remcos RAT Masquerade as VeraCrypt Installers Steals Users Login Credentials Remcos RAT Masquerade as VeraCrypt Installers Steals Users Login Credentials Cyber Security News
Citrix Netscaler 0-day RCE Vulnerability Patched Citrix Netscaler 0-day RCE Vulnerability Patched Cyber Security News
CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks Cyber Security News
VexTrio TDS System Developing Several Malicious Apps Mimic as VPNs to Publish in Google Play and App Store VexTrio TDS System Developing Several Malicious Apps Mimic as VPNs to Publish in Google Play and App Store Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams Outage: Desktop Client Update Rollback Efforts
  • JanaWare Ransomware Targets Turkish Users with Adwind RAT
  • Hackers Exploit Intel Utility for Covert Malware Deployment
  • Dual Malware Campaign Deploys Gh0st RAT and Adware
  • North Korean Hackers Exploit Fake Meetings to Target Crypto Experts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams Outage: Desktop Client Update Rollback Efforts
  • JanaWare Ransomware Targets Turkish Users with Adwind RAT
  • Hackers Exploit Intel Utility for Covert Malware Deployment
  • Dual Malware Campaign Deploys Gh0st RAT and Adware
  • North Korean Hackers Exploit Fake Meetings to Target Crypto Experts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark