Home Malware Programs Ransomware '.XmdXtazX File Extension' Ransomware

'.XmdXtazX File Extension' Ransomware

Posted: September 20, 2017

The '.XmdXtazX File Extension' Ransomware is a Trojan that uses encryption-based attacks to lock your files, which can include formats such as movies, audio, spreadsheets and documents. After a successful attack, the '.XmdXtazX File Extension' Ransomware requests that its victims pay Bitcoins by displaying a ransom note in a pop-up window, although the con artists may not provide any file-restoring services after taking the money. Secure backups can mitigate any risk to your files, and most anti-malware products should remove the '.XmdXtazX File Extension' Ransomware automatically as a threat to your PC.

Trojans Skipping Their Grammar Lessons

Even though the presentation is a not-unimportant part of designing most file-encrypting Trojans, threat actors don't always take the time to polish it up to professional standards. Recent samples of a new threat using a remix of previous ransom messages are targeting English speakers, but with formatting issues suggesting that its author's first language is another one. However, this new '.XmdXtazX File Extension' Ransomware still implements both social engineering tricks and conventional, file-damaging attacks as its creator intends.

The '.XmdXtazX File Extension' Ransomware compromises the PC's security via methods malware experts still are analyzing, with email and manual introduction through RDP exploits being two strategies in broad use currently. Its primary payload uses encryption, without any visible symptoms for the user, to lock data types such as PDF documents, JPG pictures, and other formats not related to the operating system's core functions. Appending the '.XmdXtazX' string to each file's name gives the victim one of two means of detecting which files the Trojan is holding hostage.

The '.XmdXtazX File Extension' Ransomware also loads an HTA-formatted pop-up that includes its instructions for transferring the Bitcoin currency (which it expresses in an equivalent of thirty-five Euros) to buy the threat actor's file-unlocking decryption service. Besides significant typos in the English text, the '.XmdXtazX File Extension' Ransomware also includes a fake US FBI logo, threats of deleting your files within one day, and generic warnings about an 'undetectable virus' attacking the PC. Most of the provided information is innacurate, and malware experts estimate that the message is from a variety of 'borrowed' components from the campaigns of previous Trojans, such as the Crypto-Blocker Ransomware and the Mr403Forbidden Ransomware.

A Cost-Estimate of a Con Artist's Countdow

Any other symptoms by the '.XmdXtazX File Extension' Ransomware, while limited to after damaging your local media, may cause additional security or UI issues. This Trojan may block security software, such as AV tools or the Windows Task Manager, auto-launch itself with Registry exploits, change your desktop's background image, or delete your most recent backups. Saving backups to a device that's not at risk of being infected keeps victims from having no choice but to pay a ransom to restore their media. Malware experts also can endorse testing the compatibility of free decryption software when it's available.

The '.XmdXtazX File Extension' Ransomware has yet to show evidence of having any file-deleting features, which the most recent campaigns by file-locking threats bluff typically. However, users should be careful to avoid restarting their computers without using Safe Mode or other recovery features designed to prevent threatening software from loading automatically. PCs with any traditional anti-malware protection should be able to remove the '.XmdXtazX File Extension' Ransomware immediately, although similar products also may disinfect a PC, if not necessarily recover any encrypted media.

With so many resources both rented out and available for free abuse, the cost of administering a Trojan campaign specializing in encryption is almost nil. Users are better off backing their files up than betting that the '.XmdXtazX File Extension' Ransomware's distribution exploits are as simple-minded as its extortion demands.

Loading...