Home Malware Programs Ransomware ‘.micro File Extension’ Ransomware

‘.micro File Extension’ Ransomware

Posted: January 18, 2016

The '.micro File Extension' Ransomware is a Trojan that scans any accessible hard drives for certain types of files and then encrypts them to block their further use. A ransom message encourages paying con artists to 'buy' a potential decryption key. Just as malware analysts have seen in other variants of this threat, the '.micro File Extension' Ransomware includes updates for making past freeware decryptors less effective at reversing its attacks. However, removing the '.micro File Extension' Ransomware and using other means of recovering your data is still the ideal solution for both your information and your finances.

A Macro Hoax Conducted with Micro Files

The '.micro File Extension' Ransomware is a third update to the well-known TeslaCrypt Trojan, a file encryptor receiving significant development support from its coding team. The original variants of 2016's first patches, the '.xxx File Extension' Ransomware and the '.ttt File Extension' Ransomware, were being deployed in the Christmas season. However, the continuing development of still more revisions like the '.micro File Extension' Ransomware could be indications of its development team being interested in conducting long-term attacks with these threats for months to come.

The '.micro File Extension' Ransomware still encrypts files on your PC by scanning for data of particular types, such as spreadsheets or gaming software components (TeslaCrypt's traditional target). After receiving the encryption process, your files can't be interpreted by any of their compatible programs due to the algorithmic rearranging of their internal data. The '.micro File Extension' Ransomware's administrators use these attacks for selling decryption services to their victims, to which they provide instructions for using via tutoring files also dropped on the infected machine.

These traits are usual for most file encryptors, including all TeslaCrypt variants. Malware experts saw the most relevant content for the '.micro File Extension' Ransomware and its relatives focusing on internal features that increase the difficulty of undoing the payload. These changes include additional protection for the '.micro File Extension' Ransomware's decryption key, which is a primary component in recovering data from already-compromised files. This protection prevents PC owners from using previously-released security tools for recovering their data directly.

Shrinking the Profits of a the '.micro File Extension' Ransomware Campaign

Although standard ransom fees demanded by threat authors are far from being 'micro,' even paying the sums demanded victims have no reassurance of been provided with a workable decryption solution. Even when decryption is impractical, malware analysts have found most file encryptors incapable of blocking most file backup strategies. Backup Web servers or removable devices can give victims a safe way of recovering any encrypted files for free and without the risks of conducting transactions with con artists. Future developments also may see freeware decryptors being provided by various PC security companies, which has been seen with the '.micro File Extension' Ransomware's older TeslaCrypt versions.

Whether or not you want to restore any encrypted files, you should remove the '.micro File Extension' Ransomware from a compromised PC immediately. Anti-malware applications, especially when provided with assistance from the Safe Mode feature, can detect and delete the '.micro File Extension' Ransomware, along with other threats. The '.micro File Extension' Ransomware does not have any self-distribution functions and, if the '.micro File Extension' Ransomware is not bundled with a download, it could be installing itself through another form of threat, such as a Trojan dropper.

PC security researchers have noted that the '.micro File Extension' Ransomware has had no updates to its encryption algorithm, which shows how file encryption attacks can be made more 'secure' against decryptors with even a minimum of changes.

2 Comments

  • Cihan says:

    i can help infected users with Teslacrypt for only extentions (.vvv, .ecc, .ezz, .exx, .xyz, .zzz, .aaa, .abc, .ccc), please

  • Jeff D says:

    Just something i noticed when trying an undelete/restore... Not all the files named "help_recover_instructions.html" are the same... i noticed by looking at the files using a hex editor and notepad that some of them are different. such as those locatd in :
    %appdata%/
    /ProgramData/Microsoft/Crypto/RSA/MachineKeys
    /ProgramData/Microsoft/Crypto/RSA/S-1-5-18
    it looks like some may even be keys or partial keys, but i'm not a programmer and am not sure how to use it to decrypt my files.. can someone check this theory out for me? thanks

Loading...