Home Malware Programs Ransomware Cndqmi Ransomware

Cndqmi Ransomware

Posted: September 9, 2020

The Cndqmi Ransomware is a file-locking Trojan from the family of the Snatch Ransomware. The Cndqmi Ransomware can stop files from opening by encrypting them and may abuse Windows features like Safe Mode while it does so. Windows users with sufficient anti-malware protection should find and delete the Cndqmi Ransomware automatically, although having a secure backup for recovery is extremely helpful.

Trojans Spreading with Predictable Methods and Unpredictable Names

As a Trojan family, the Snatch Ransomware is far from the most populous of its kind, and has dozens to hundreds of campaigns yet, before it catches up to competing options on the black market. Recent versions aren't harmless for being less often seen necessarily, though, which newly-determined samples like the Cndqmi Ransomware show all too well. This minor update of the Snatch Ransomware is yet another Trojan turning Windows users' bad backup habits into a revenue source.

The Cndqmi Ransomware's family is well-known for preferring random strings for their names while modifying not many other factors in their payloads. In this respect, the Cndqmi Ransomware is all but a perfect clone of relatives like the Fxmwtv Ransomware, the Mcauwpjib Ransomware, the Tkoinprz Ransomware, or the concurrent the Jdokao Ransomware. The other difference the Cndqmi Ransomware bears is a custom e-mail (as usual, from a free and private e-mail service) for negotiating with the threat actor over its ransom.

More importantly, the Cndqmi Ransomware is a significant security risk for its encryption feature, by locking files and stopping other programs from opening them. Ordinarily, the secure encryption isn't reversible without access to the threat actor's custom-generated key. Users should remain alert to backup precautions for the most vulnerable formats, such as documents and Microsoft Office content, audio-visual media like music and pictures and archives especially.

Outguessing Randomized Trojan Attacks

Although each campaign from the Cndqmi Ransomware's family uses totally-arbitrary names, their technical infection steps and exploits are predictable reasonably. This threat endangers Windows environments without any interest in being compatible with other operating systems. Users can protect themselves appropriately by:

  • Using passwords that aren't weak against dictionary attacks
  • Disabling Flash, Java and JavaScript while Web-browsing
  • Turning off macros and ensuring that Microsoft Office products are updated
  • Refusing illicit downloads, such as copyright-protected movies, software cracks or game cheat tools

Some file-locker Trojans will use more complex techniques, up to the point of compromising software-download supply chains and official websites. However, most users can protect their PCs and files sufficiently with the above steps and a reasonable backup schedule.

Anti-malware programs from reliable companies also should delete file-locker Trojans of all families and find and remove the Cndqmi Ransomware.

The burst of activity from the up-and-coming Snatch Ransomware family comes at the expense of any users that encounter its constituent members, like the Cndqmi Ransomware. Even free backup services offer sufficient protection for ignoring Trojans of the Cndqmi Ransomware's caliber and make a persuasive argument for anyone on Windows who cares to listen.

Loading...