Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

699+ Articles
119+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. JanaWare: Geofenced Ransomware Has Silently Targeted Turkey Since 2020
JanaWare: Geofenced Ransomware Has Silently Targeted Turkey Since 2020
NEWS

JanaWare: Geofenced Ransomware Has Silently Targeted Turkey Since 2020

Researchers at Acronis have uncovered JanaWare, a Java-based ransomware that has operated under the radar since 2020 by restricting itself exclusively to Turkish-locale systems via geofencing — a technique that also doubles as sophisticated sandbox evasion.

Dylan H.

News Desk

April 14, 2026
4 min read

A ransomware strain called JanaWare has been quietly targeting citizens and small businesses in Turkey since at least 2020, researchers from Acronis Threat Research Unit (TRU) revealed this week. The malware's most distinctive feature — enforcing geofencing checks that abort execution on any non-Turkish system — kept it almost entirely off the radar of the international cybersecurity community for nearly six years.

The Geofencing Evasion Technique

JanaWare does not execute on any system where the locale, language, or country settings do not match a Turkish environment. Before beginning encryption, the malware performs two independent checks:

  1. System locale check — Inspects Windows regional settings, system language, and country configuration. If the system is not configured for Turkey, execution halts.
  2. External IP geolocation — Queries a public IP lookup API and verifies that the returned country code begins with "TR". Even if a sandbox analyst configures a Turkish system locale, the geolocation check will detect that the analysis environment is hosted outside Turkey and abort.

This layered approach serves dual purposes: precise geographic targeting of the intended victim population and near-perfect sandbox evasion — since most automated malware analysis infrastructure is hosted in the US, Europe, or Asia. An international security researcher running JanaWare in a standard sandbox would observe nothing, filing it as a non-executing or benign sample.

Technical Architecture

JanaWare is delivered as a post-compromise plugin to the Adwind RAT — a cross-platform Java-based remote access trojan active since 2013, also known as AlienSpy, Frutas, Unrecom, Sockrat, and JSocket. The name "JanaWare" comes from the "JANAWARE" string the malware uses during its C2 handshake.

Key technical characteristics:

FeatureDetail
LanguageJava (cross-platform)
DeliveryAdwind RAT plugin post-compromise
ObfuscationHeavy obfuscation, dynamic module loading
PolymorphismSelf-modifying binaries — unique hash per infection
C2Exclusively via Tor
PersistenceRegistry-based (configurable STARTUP_TYPE)
File operationsEncrypt, delete, and exfiltrate files across all drives

The ransom note uses the filename _ONEMLI_NOT_ — the Turkish phrase for "Important Note" — followed by a randomized suffix, reinforcing the deliberate cultural and geographic targeting.

Why It Stayed Hidden for Six Years

Several factors allowed JanaWare to operate in near-total obscurity:

  • Regional focus: Most global threat intelligence focuses on high-volume campaigns targeting English-speaking markets or major economies. Turkey-specific campaigns are underrepresented in telemetry.
  • Polymorphic design: Each infection produces a binary with a unique hash, defeating signature-based detection and making cluster analysis harder.
  • Tor C2: All command-and-control communications route through Tor, preventing network-based attribution or takedown.
  • Small victim pool: Targeting home users and SMBs in a single country limits the probability of an infected machine being submitted to a major threat intelligence platform.

The Acronis TRU researchers note that a sample compiled in November 2025 confirmed active C2 infrastructure, meaning the operation was still running at the time of discovery.

Cybercriminal Ecosystem Fragmentation

The Record's coverage of JanaWare frames it within a broader trend: the fragmentation of the cybercriminal ecosystem. While major Ransomware-as-a-Service (RaaS) groups like LockBit, BlackCat, and Clop dominate headlines, a growing number of smaller, geographically isolated operations are running independently — flying below the detection threshold of international law enforcement and threat intelligence agencies.

These "micro-campaigns" share several characteristics:

  • Deliberately narrow geographic targeting to avoid global attention
  • Independent development outside major RaaS affiliate programs
  • Sustained operations measured in years, not months
  • Victims who may lack access to incident response resources comparable to large enterprise targets

File recovery without access to the C2 infrastructure is not feasible for JanaWare victims, as the decryption keys are held server-side and only accessible via the Tor-based C2.

Indicators and Detection

Organizations and endpoint security vendors should update detection rules to cover:

  • Java-based payloads that perform locale and external IP geolocation checks before executing
  • Adwind/AlienSpy/JSocket RAT variants used as delivery mechanisms
  • Tor network connections initiated from Java processes
  • Registry modifications consistent with STARTUP_TYPE persistence mechanism
  • Ransom note files matching pattern _ONEMLI_NOT_*
  • C2 beacon handshakes containing "JANAWARE" strings

Turkish organizations in particular should ensure endpoint detection and response (EDR) solutions are deployed and configured to catch Java-based ransomware, which can bypass traditional antivirus solutions that focus on native Windows executables.

References

  • New JanaWare ransomware targeting Turkish citizens as cybercriminal ecosystem fragments — The Record
  • New JanaWare ransomware targets Turkey via Adwind RAT — Acronis TRU
#Ransomware#JanaWare#Turkey#Geofencing#Adwind RAT#Malware#Cybercrime

Related Articles

LeakNet Ransomware Weaponizes ClickFix and Deno Runtime for Stealthy Corporate Attacks

The LeakNet ransomware gang is using ClickFix social engineering for initial access and a Deno-based malware loader to execute fileless payloads from...

6 min read

Dutch Hospitals Disrupted After Ransomware Hits Healthcare IT Provider ChipSoft

A ransomware attack on Dutch healthcare software vendor ChipSoft has forced hospitals and patients across the Netherlands offline, disrupting the HiX...

4 min read

Healthcare IT Solutions Provider ChipSoft Hit by Ransomware Attack

Dutch healthcare software vendor ChipSoft has been struck by a ransomware attack, forcing the company to take its website and digital patient services...

3 min read
Back to all News