Home Malware Programs Ransomware cuteRansomware Ransomware

cuteRansomware Ransomware

Posted: December 22, 2020

The cuteRansomware Ransomware is a file-locking Trojan without a family that blocks data on Windows systems. Like most threats that use encryption features for blocking files, it is most likely to target documents and other personal media. Users should have backups for recovering without paying the ransom. Most PC security products with threat-detecting features should delete the cuteRansomware Ransomware beforehand and are dependable disinfection solutions.

A Not-So-Cute Program Taking over Your Files

As part of an irregular trickle of non-family-based threats, the cuteRansomware Ransomware uses encryption attacks against victims' files like that of Hidden Tear. The file-locking Trojan also has some symptoms not too different from Russia's Scarab Ransomware group, namely, concerning how it displays any files after it blocks them. Victims may prefer a cuteRansomware Ransomware infection to alternatives, though, since this threat is cheaper than the usual extortion campaigns.

The cuteRansomware Ransomware is a Windows, .NET Framework program that uses what it asserts as AES encryption (likely, but not yet verifiable through malware analysts) for stopping documents, images and other media from opening. After encrypting the files' data, it also rewrites their names with random alphanumeric characters, including a replacement extension ('jgy'). It also removes the first extension in this process, which is a little atypical for file-locker Trojans.

The cuteRansomware Ransomware also leverages a typical ransom attempt through an HTA pop-up, with a memorable 'your files have been taken over' headline, a static deadline, a Bitcoin wallet address and a cash demand that translates to just over two hundred USD. The cheapness of the cuteRansomware Ransomware's ransom is a clue to its threat actor's experience. Malware researchers rate it as very unlikely that the cuteRansomware Ransomware uses targeted methods against corporate entities for its infection vectors.

Pushing Back on a Digital Media Takeover

Since the cuteRansomware Ransomware's wallet has no payments, its campaign has a minimal incentive for further development or support. Users can guarantee that the state continues by having backups of their work that let them recover any locked files without needing a decryption key or application. Importantly, malware experts also point out that the cuteRansomware Ransomware may not delete local backups like the Restore Points – although most file-locking Trojans will do so.

'Casual' Trojan campaigns like this one use expensive infection methods like supply-chain compromises or digital certificates rarely. However, the cuteRansomware Ransomware may drop on users' PCs through illicit files like a game crack, interactions with torrents, or drive-by-downloads that exploit software vulnerabilities in Flash, JavaScript, or document macros. Appropriate security settings and law-abiding, sensible Web-surfing behavior will protect against most of these issues.

Although detection rates for this new threat aren't very high, users should offer samples to reputable researchers for analysis. They also should continue using dedicated security services for blocking possible attacks or removing the cuteRansomware Ransomware installations.

Without a coin to its name, the cuteRansomware Ransomware is a modest effort for a new threat actor and his or her Trojan accessory. Still, even the lowliest file-locker Trojans are problems to almost any data without backups and worth treating with respect.

Loading...