Home Malware Programs Ransomware Zyka Ransomware

Zyka Ransomware

Posted: February 2, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 11
First Seen: February 2, 2017
OS(es) Affected: Windows

The Zyka Ransomware is a Trojan with encrypting capabilities that can block you from opening your local files, such as documents, photos or music. Con artists use these attacks for demanding ransoms to restore the encoded content, although malware experts suggest that you first search for a free decryption alternative. You can protect your files by keeping anti-malware products that can detect and remove the Zyka Ransomware immediately.

The 'Anonymous' Extortion with a Recognizable Mask

The campaign for the Zyka Ransomware is one of the last in a series of attacks co-opting the identity of the decentralized, hacker-activist organization Anonymous for the sake of extortion. While malware experts are finding no trail of evidence linking Anonymous to this Trojan, con artists most likely are exploiting the group's brand to give more credibility to their threats. However, since a successful Zyka Ransomware infection already barricades a variety of files on your PC, making any additional warnings, is arguably redundant.

The Zyka Ransomware may gain system access through such methods as bundling itself in a torrent download, installing itself via a website's script-based exploits or attaching itself to a forged e-mail. After infecting your PC, the Zyka Ransomware searches any available directories for over fifty file formats, including JPG, PDF and RAR. It encodes them with a cipher most likely deriving from AES and tags each filename with the '.lock' extension (which inserts itself after any already-existing one). With your files locked, the Zyka Ransomware launches what malware experts identify as a standardized, HTA-based ransom note.

The Zyka Ransomware's recycles this note from other file-encrypting Trojans' campaigns, with the only updated elements being a new Bitcoin wallet address, an Anonymous-themed background, and a new ransom demand (170 USD in Bitcoin currency). Using cryptocurrency allows con artists the option of taking the money without helping you recover your files, and is one reason why malware experts recommend recovering from a backup, or with the aid of credible anti-malware products.

Looking at the Real Face of Cyber Extortion

Since the vast bulk of the Zyka Ransomware ransoming instructions are direct copies of past attacks in circulation via a variety of threat actors, you should treat any information it offers as being suspect. With the appropriate samples of both threats and any encrypted content, third party malware researchers often may deliver decryption solutions that don't require paying a con artist. However, malware experts always recommend keeping spare backups for cases where decoding your files becomes impossible.

The Zyka Ransomware's extortionist characteristics are more in line with attacks against recreational PC users than business or government systems. Such attacks may abuse e-mail infection strategies, bundle their Trojan droppers inside of unrelated downloads, or use Web-browsing exploits to install this threat automatically. Scan new files with anti-malware products and disable potentially harmful browser features to remove the Zyka Ransomware before it locks any of your local content.

Seeing a symptom like the '.lock' extension on your files is indicative of already inflicted damage that may not be recoverable. When it comes to Trojans like the Zyka Ransomware, a small amount of preventative maintenance is both a matter of computer security and financial safety.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 69.63 KB (69632 bytes)
MD5: 66d013f8ba679eecd743116d3299a855
Detection count: 40
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 11, 2017
Loading...