Home Malware Programs Ransomware CC1H Ransomware

CC1H Ransomware

Posted: November 6, 2020

The CC1H Ransomware is a file-locking Trojan from the Globe Imposter Ransomware family. This threat imitates Globe Ransomware's symptoms while conducting actual encryption attacks for blocking the user's files. Proper backup procedures can limit the data losses, and most cyber-security utilities should remove the CC1H Ransomware as a threat.

A Familial Faker Delivers Very Real Problems to Windows Users

The copycat Trojan family of the Globe Imposter Ransomware shows that a Trojan's aesthetic facade and its attack features aren't always reliably linked. Any threat is capable of misleading victims by appearances. The ongoing campaigns of this family, running through variants like the Taargo Ransomware, the BlueCheeser Ransomware, the .DOCM Ransomware, and the Healforyou Ransomware, has a new example for November. Curiously, malware researchers also see a variant of this CC1H Ransomware, making for a rare fork of software in a recently-detected Trojan.

Both versions of the Trojan use encryption for locking media files, and by doing so, can block the user's documents, pictures, spreadsheets and similar work content. However, a split in builds causes one to append a 'CC1H' extension. A second version replaces the extension's number with a '4.' Although it seems likely that a threat actor is iterating on campaigns with at least two more builds sequentially, malware experts have yet to find samples for confirmation of this hypothesis.

The CC1H Ransomware creates a ransom note, as well, which users should avoid mistaking for the payload of the Globe Ransomware or the Crysis Ransomware, both of which resemble this Trojan's family in that respect. Classically, the CC1H Ransomware offers an ID and e-mails for negotiating over the decryptor for recovering files, without which the affected media can't open. The China references in these addresses might be facetious, as malware researchers see no evidence of the CC1H Ransomware's threat actor being Chinese or deploying the Trojan in that country.

Tucking Files Out of Sight of Trojan Impersonators

Some versions of the Globe Imposter Ransomware family use social engineering tactics and phishing lures against their victims. However, infection vectors for entire families of file-locker Trojans are flexible, according to the attacker's experience and discretion. All Windows users should take precautions against threats like the CC1H Ransomware both for blocking infections and limiting the Trojan's access to their data.

Users can back their work up to other devices, which denies the CC1H Ransomware any ransoming leverage via digital media. Local backups usually are deleted, which is a capability in the CC1H Ransomware's family and most other competing ones. Malware experts also point out e-mail lures as noted drive-by-download risks through tactics such as fake work documents with corrupted macros (or 'advanced content') particularly. Password security also is crucial for stopping attackers that use brute-force techniques for 'guessing' login credentials.

Trustworthy AV vendors will flag most Globe Imposter Ransomware versions as threats to the user's computers. PCs with suitable security software should delete the CC1H Ransomware before the encryption, the Restore Point deletion, or other attack loads.

The need for seemingly-redundant copies of the CC1H Ransomware might be open to questioning, but victims should respond to each fork in this Trojan's path the same way each time. Those without backups or security solutions are risking everything on dodging threats they might not see coming, and the average ransom is no small matter for anyone.

Loading...