Home Malware Programs Ransomware CryptoFortress

CryptoFortress

Posted: March 6, 2015

Threat Metric

Threat Level: 10/10
Infected PCs: 77
First Seen: March 6, 2015
OS(es) Affected: Windows

CryptoFortress is a file encryptor Trojan that uses an RSA encryption algorithm to make your stored data unreadable. After modifying your files, CryptoFortress also places instructions on your hard drive demanding cash payment in return for their restoration. Like other file encryption Trojans, there are zero guarantees of CryptoFortress's keeping its word after receiving payment, which is why malware experts recommend alternative solutions to its attacks. Anti-malware tools in conjunction with good file backup strategies should allow you to both remove CryptoFortress and protect your data from its attacks.

A Bastion of Illicit Activities Extending Over Your Network

CryptoFortress is a probable spinoff of the similar TorrentLocker Trojan, or, alternatively, was likely de-veloped by the same team. Although the similarities in ransom messages between these two threats are significant, malware analysts recently verified that CryptoFortress also differentiates itself from TorrentLocker: CryptoFortress can attack a broader expanse of files. Besides ransoming the files on the victim's primary hard drives, CryptoFortress also attacks network-shared files, regardless of whether or not you map them to a drive letter.

CryptoFortress's file encrypting attack uses a difficult-to-decrypt RSA algorithm that modifies your files to make them unreadable. Modified files can be recognized by the addition of the '.frtrss' extension, after their default file type suffixes. Malware analysts noted that CryptoFortress, like other file encryptors of late, also deletes the Shadow Volume Copies that would allow you to restore your files from an automatic backup (such as via System Restore).

An HTML ransom instruction delivered by CryptoFortress requests a sum in exchange for decrypting the affected files, with current ransoms holding at one Bitcoin (currently 274 USD). Although CryptoFortress does appear to have some limited decryption functions, as shown by its 'sample' decryption feature, its developers have no reason to honor any further decryption promises once they receive the ransom.

Dealing with a Nuclear-Delivered Trojan

CryptoFortress is one of the various forms of threats in payloads from the NuclearPack Exploit Kit, a browser-based threat that uses software vulnerabilities in its attacks. While the numbers behind Cryp-toFortress's current campaigns still are being estimated, this delivery method does have high potential for achieving elevated numbers of infections on a global scale. Updating your software and using proactive anti-malware security with your browser are the two defenses most effective against Exploit Kits, including the ones delivering CryptoFor-tress.

Meanwhile, CryptoFortress's encryption routine also shows signs of third parties with eyes on a large-scale ransom campaign. PC users who use network backups or permanently-attached storage devices should consider alternative means of formatting their backups that are less vulnerable to CryptoFortress's known capabilities. Whatever choice in file restoration you prefer to use, deleting CryptoFortress with anti-malware software should be your highest priority, after which you can take any steps needed to save your data.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



Dir\CryptoFortress __ 2015-03-12.exe File name: CryptoFortress __ 2015-03-12.exe
Size: 228.86 KB (228864 bytes)
MD5: e6dda3e06fd32fc3670d13098f3e22c9
Detection count: 10
File type: Executable File
Mime Type: unknown/exe
Path: Dir
Group: Malware file
Last Updated: May 14, 2017
Loading...