Home Malware Programs Ransomware Czech Ransomware

Czech Ransomware

Posted: August 23, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 90
First Seen: August 23, 2016
OS(es) Affected: Windows


The Czech Ransomware is a Trojan that locks your files by encrypting them and launches a pop-up to ask for Bitcoins before its threat actor gives you the decryption solution. PC users should avoid protecting their local data by watching for the symptoms of an infection, which appear after the (potentially non-reversible) encoding occurs. When possible, malware analysts recommend deleting the Czech Ransomware with an anti-malware product of your choice and recovering all content from backups.

The Czech Republic Gets a New Taste of Trojans

With many threat actors upgrading to honed methods like crafted e-mails for distributing their Trojans, it can be easy to forget about the previous popularity of website vulnerabilities and Exploit Kits. The people newly-responsible for the Czech Ransomware show an interest in bringing back this 'old-school' infection vector currently, with two compromised domains serving the Trojan to any vulnerable PCs. The sites, like the Czech Ransomware, itself, target Czech-speaking PC users, although the campaign is, otherwise, traditional for attacks of its kind.

The Czech Ransomware encrypts your files according to a two-part method that, first, uses AES to lock your content, and RSA to prevent any security researchers from decoding the first cipher. You can identify any locked content by their '.encr' extensions. Fortunately, malware experts find the Czech Ransomware using very narrow definitions for formats to encode, specializing in video and audio media (such as MP4, AVI, MPG, and WMV). Text content like documents or spreadsheets is not within the current parameters.

The Czech Ransomware delivers its ransom demands for selling its file-unlocking decryption services over an HTML application, very similarly to 'This is Hitler' Ransomware, Jigsaw Ransomware, and other threats with interactive pop-ups. Its authors ask for Bitcoin payments to prevent any victims from taking their money back afterward even if there is no decryption help.

Containing Another Outbreak of European Threats

Malware experts' past experiences with similar campaigns indicate that the Czech Ransomware is liable to appear in new, regional variations in the next few months. Even if its threat actors take no further action, victims can experience attacks after doing no action more harmful than browsing one of its host websites (financnasprava(dot)digital and uradvlady(dot)eu) without proper security. Disabling your browser's script-based features, using an ad-blocker and having anti-malware products that block unsafe domain requests should eliminate these infection vectors.

Regardless of the competence of your security software, data encryption, particularly when protected by asymmetric AES-RSA methods, isn't guaranteed of being curable. Keep your files safe by backing them up preemptively to a location not likely of being the target of a Trojan's attack, and avoid paying money to threat actors who have no motivation to honor their word on ransom-based transactions. Users with anti-malware products may detect and delete the Czech Ransomware automatically, although rates of identifying this new threat remain non-ideal across the cyber security industry.

No matter how large or small your country is, con artists are both willing and able of finding ways of seeking profit by attacking your computer. The Czech Ransomware shows that just as much as always, any individual hacker is capable of pushing his attacks forward in ways that aren't always predictable.

Loading...