Posted in

JanaWare Ransomware: How Customized Adwind RAT Targets Turkish Users

Imagine a threat that has been lurking in the digital shadows for over five years, invisible to global security researchers simply because it knows exactly where its victims live. This is not the plot of a techno-thriller; it is the reality of JanaWare ransomware.

Recent intelligence from the Acronis Threat Research Unit (TRU) has unmasked a highly sophisticated, geographically targeted campaign primarily affecting home users and SMEs in Turkey. By leveraging a customized version of the infamous Adwind Remote Access Trojan (RAT), JanaWare sidesteps traditional security perimeters.

In this deep dive, we will analyze the mechanics of the JanaWare infection chain, the technical brilliance of its geofencing evasion, and the actionable steps your organization must take to mitigate this persistent threat.


What is JanaWare Ransomware?

JanaWare is a specialized ransomware strain that functions as a post-exploitation module delivered via the Adwind RAT. Unlike “Big Game Hunting” groups like LockBit or Conti, which demand millions from global enterprises, JanaWare operates on a low-value, high-volume model.

Key Characteristics of the JanaWare Campaign:

  • Target Demographics: Specifically geofenced to Turkish-speaking users and IP addresses.
  • Delivery Mechanism: A multi-stage infection starting with a malicious Java Archive (JAR) file.
  • Ransom Demands: Ranging from $200 to $400 USD, priced to encourage quick payments from individuals and small businesses.
  • Persistence: Evidence of activity dates back to 2020, with C2 infrastructure remaining live as recently as late 2025.

Anatomy of the Attack: From Phishing to Encryption

The JanaWare infection chain is a masterclass in using trusted applications to mask malicious intent. The attack moves through several distinct phases:

Phase 1: The Initial Hook

The attack begins with a localized phishing email. These emails typically contain a link to a file hosted on Google Drive. Because Google Drive is a trusted domain, many basic email filters and users fail to flag the URL as suspicious.

Phase 2: The Trusted Handoff

When a victim clicks the link, Chrome opens the Drive URL and downloads a JAR (Java Archive) file. When executed, the system uses javaw.exe to run the file. This handoff between Outlook, Chrome, and Java looks routine to basic security monitoring tools, allowing the malware to bypass initial scrutiny.

Phase 3: The Adwind RAT Loader

The JAR file isn’t the ransomware itself; it’s a customized Adwind RAT. Adwind (also known as Frutas or AlienSpy) is a cross-platform, Java-based Trojan. In this campaign, the attackers have modified the RAT with unique modules and post-exploitation scripts specifically designed to deploy JanaWare.


Technical Analysis: Evasion and Geofencing Mechanics

What makes JanaWare particularly dangerous is its ability to remain “invisible” to the global cybersecurity community. It employs several advanced evasion techniques:

1. Regional Geofencing

Before JanaWare executes its destructive payload, it performs a series of environment checks:

  • System Locale: Checks if the OS language is set to Turkish.
  • IP Geolocation: Queries the host’s external IP. If the country code does not start with “TR”, the malware terminates immediately.
  • The Result: Sandbox environments in the US or Europe see no malicious activity, leading researchers to misclassify the file as benign.

2. Polymorphic Behavior and Obfuscation

The developers utilize Stringer and Allatori, two powerful Java obfuscators, to scramble the code and prevent reverse engineering. Furthermore, a class named FilePumper adds random data to the JAR archive during installation. This changes the file’s MD5 hash on every single machine, rendering signature-based antivirus solutions ineffective.

3. Defense Evasion via PowerShell

Once the geofencing check passes, the malware executes a series of commands to “strip” the system of its armor:

  • Disabling Microsoft Defender: Suppressing alerts and real-time scanning.
  • VSS Deletion: Removing Volume Shadow Copies to prevent easy file recovery.
  • Update Suppression: Disabling Windows Update to keep the system vulnerable.

Comparison: JanaWare vs. Traditional Ransomware

FeatureJanaWareStandard Enterprise Ransomware
Primary TargetTurkish Home Users/SMEsGlobal Enterprises/Infrastructure
Delivery VectorAdwind RAT (Java-based)RDP Brute Force / Cobalt Strike
Ransom Amount$200 – $400 USD$50,000 – $10M+ USD
CommunicationqTox & Tor (.onion)Leak Sites & Email
LanguageTurkish (ONEMLI NOT)English / Multi-language

Export to Sheets


How to Protect Your Network from Adwind and JanaWare

As a senior analyst, I recommend a multi-layered defense strategy focused on the specific behaviors of Java-based threats.

1. Restrict the Java Runtime Environment (JRE)

If your endpoints do not strictly require Java for business operations, uninstall it. For environments where Java is necessary:

  • Block the execution of JAR files from the Downloads or Temp folders.
  • Associate .jar extensions with a text editor rather than javaw.exe to prevent accidental execution.

2. Strengthen Email Security

Configure your Email Security Gateway (ESG) to:

  • Flag or quarantine emails containing Google Drive links paired with executable indicators.
  • Scan for JAR attachments, even if they are inside ZIP or RAR archives.

3. Monitor Network Anomalies

Search your logs for outbound traffic to known JanaWare C2 infrastructure:

  • Domain: elementsplugin.duckdns.org
  • IP Address: 151.243.109.115
  • Common Ports: 49152, 49153

4. Implement Zero Trust Architecture

The use of Tor for C2 communication is a major red flag. Implement a Zero Trust model that blocks traffic to the Tor network from standard business endpoints.


Expert Insights: The Risk-Impact Analysis

The low ransom demand of JanaWare is a tactical choice, not a sign of amateurism. By keeping the price point low, the attackers increase the likelihood of a “frictionless” payment. For a small business in Turkey, paying $300 is often cheaper and faster than hiring a forensic consultant.

However, paying the ransom funds further development of the Adwind RAT ecosystem. Furthermore, because JanaWare disables security updates and deletes backups, an infected machine remains highly vulnerable to secondary infections even after files are decrypted.

Pro Tip: Always preserve forensic evidence. Even if you choose to recover from backups, the JAR file and logs contain vital telemetry that can help national CERTs track the infrastructure.


Frequently Asked Questions (FAQs)

1. Why does JanaWare only target Turkey?

By narrowing their focus, the attackers can create highly convincing phishing content in the local language and avoid detection by international security firms that don’t use Turkish-based exit nodes for their sandboxes.

2. Can I recover my files without paying?

Currently, JanaWare uses AES encryption and transmits the key over the Tor network. Unless a flaw is found in their implementation or the C2 server is seized, recovery without a backup or the attacker’s key is virtually impossible.

3. Is Adwind RAT still a threat in 2026?

Yes. Despite being over a decade old, Adwind remains a potent threat because it is cross-platform (Java) and easily customizable. The JanaWare campaign proves that old malware can be successfully “repackaged” for new targets.

4. What should I do if I find “ONEMLI NOT” on my computer?

Immediately disconnect the device from the network to prevent the ransomware from spreading to shared drives. Identify the entry point (likely a recent JAR download) and contact your IT security department or a local law enforcement agency.


Conclusion: Staying Ahead of Localized Threats

JanaWare serves as a potent reminder that cybersecurity is not just a global battle, but a local one. The combination of a customized Adwind RAT, clever geofencing, and a low-friction ransom model has allowed this campaign to persist for years.

To stay protected, organizations must move beyond generic security signatures and focus on behavioral detection—specifically monitoring for unauthorized Java execution and suspicious PowerShell activity.

Is your organization’s endpoint protection ready for localized, polymorphic threats? Conduct a security posture assessment today to identify vulnerabilities in your Java configurations and email filtering.

Leave a Reply

Your email address will not be published. Required fields are marked *