Cyber Splitter Vbs Ransomware
Posted: September 23, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 12 |
First Seen: | September 23, 2016 |
---|---|
Last Seen: | December 16, 2019 |
OS(es) Affected: | Windows |
The 'Cyber Splitter Vbs' Ransomware is a Trojan that encrypts your files to deny your access to them until you transfer money to ransom them. Like Trojans with similar payloads, the 'Cyber Splitter Vbs' Ransomware endangers the contents of any hard drive or server it can access, and may not restore your information, even if you do pay its ransom. Preemptive data protection methods and using appropriate anti-malware features can limit the impact of an infection or remove the 'Cyber Splitter Vbs' Ransomware before it can inflict any damage.
When Backdoor Trojan Authors Split Their Efforts Up into Extortion Campaigns
Cyber SpLiTTer is a name malware researchers have connected to ongoing Trojan campaigns specializing in backdoor attacks or remote access. Although that has been the primary focus of that threat brand name since early 2016, new Trojan samples point to the developer shifting towards a new kind of threat: file encryption Trojans. The 'Cyber Splitter Vbs' Ransomware is the current centerpiece of this new campaign, which encodes your data out of the hope of forcing you to pay ransom money.
The 'Cyber Splitter Vbs' Ransomware searches all accessible directories not critical to the operating system for easily-encrypted formats, such as DOC-based documents. These data types then are encrypted with an algorithm malware experts are identifying, although almost all Trojans of the same classification use a simple form of Advanced Encryption Standard (AKA AES). Once it's encrypted your data, blocking you from it, the 'Cyber Splitter Vbs' Ransomware loads a pop-up window.
The 'Cyber Splitter Vbs' Ransomware's pop-up uses a configurable field to provide information on where to send the ransom, which is at one Bitcoin (roughly six hundred USD) currently. The window doesn't include any automatic decryption feature, meaning that the threat actor expects the victim to make the payment and trust that he will restore their data afterward.
Getting the 'Cyber Splitter Vbs' Ransomware to Split from Your Hard Drives
Many file encryption Trojans use installers that circulate through e-mail spam, while lesser quantities also use other techniques. Secondary methods consist of exploit kits hosted on compromised sites or direct hacking attempts against a vulnerable server account. Using memory-constant anti-malware security protocols, scanning incoming files, and rotating through complex passwords are several top means of protecting your PC from a 'Cyber Splitter Vbs' Ransomware installer.
Since the 'Cyber Splitter Vbs' Ransomware doesn't have a current, free decryptor, any encrypted data may be tantamount to being deleted. Paying the ransom and hoping the 'Cyber Splitter Vbs' Ransomware's threat actor will reward you for the act is a less secure a method of preserving your files than keeping backups on cloud servers and removable drives significantly, both of which will negate the necessity of a decryptor.
Without your having the forethought to implement such common-sense security steps, even removing the 'Cyber Splitter Vbs' Ransomware through proper anti-malware tools may leave an aftermath of irrecoverable files on any PC, just like many, other Trojans.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.