ColdLock Ransomware

ColdLock Ransomware Description

The ColdLock Ransomware is a file-locking Trojan with strong similarities to the free 'educational' EDA2 project. The ColdLock Ransomware can lock the user's files from opening and hold them for a ransom and is most likely of infecting systems in narrowly-distributed, targeted attacks. Users should monitor possible vulnerabilities in their networks, such as password choices, and always have anti-malware products to isolate or remove the ColdLock Ransomware on detection.

An Unexpected Surge of Freezing Weather for Your Server's Data

As a file-locking Trojan family's whose propagation is under tight control, the Freezing Ransomware contrasts with the more random and opportunity-based models of the usual Ransomware-as-a-Services. However, it's sufficiently profitable that a threat actor is taking a gamble on updating it for attacks against Taiwanese business entities. The new version, the ColdLock Ransomware, also shows some code similarities to the free EDA2, although it's far from a simple clone.

Current ColdLock Ransomware attacks, albeit definite for May of 2020 as taking place in Taiwan, still are using unidentifiable infection methods. Since reports are confirming that the threat actor installs the Trojan after gaining direct access to Active Directories, it's possible that the attackers are brute-forcing passwords or using additional threats for acquiring login credentials. Some of the ColdLock Ransomware initial setups suggest connections to the Freezing Ransomware family, such as the use of reflective DLL loading, and the Trojan also has code in common with EDA2.

The file-locking aspect of the ColdLock Ransomware uses a pedestrian, but secure, AES and RSA combination for encryption, and flags every encrypted file with its 'locked' extension. However, malware researchers find that the ColdLock Ransomware means of choosing the media operates on an unusually complex series of metrics. The Trojan takes into account the directories, formats, the number of files in each location, the last data-write time, and blacklisted strings like 'cache' and 'microsoft.' It also excludes some media types that most file-locker Trojans would ransom, such as GIF pictures, AVI movies and MP3 audio.

Warming Up from a Not-So-Little Data Chill

Victims of the ColdLock Ransomware attacks have, as informed by the multiple text messages from the Trojan, less than a week for considering paying for an unlocker. Paying doesn't promise any definitive solution, but for businesses without appropriate backups, it could be the only solution for even a possibility of full data recovery. Malware researchers also rate the odds of decrypting the ColdLock Ransomware's encryption routine through third-party research as being very unlikely, even in cases where full samples are available.

Users should protect themselves through maintaining strong passwords against brute-forcing, disabling or securing RDP, and, as always, backing up all valuable files thoroughly. Software patches may or may not be pertinent for preventing ColdLock Ransomware infections. On the other hand, they are highly helpful for blocking similar, file-locker Trojans, which can use vulnerabilities inside of documents and spreadsheets or Exploit Kits on the Web.

Taiwan-based business entities should be on the lookout for phishing attacks and other network intrusions, including ones targeting their employees via well-crafted and specialized lures narrowly. Anti-malware products with full database updates, still, should find and remove the ColdLock Ransomware in most attacks.

The sheer intricacy of how the ColdLock Ransomware selects what and what not to encrypt makes for a picture of threat actors that know in great detail what they want to hold for a ransom. Such specificity of targeting methods is a showing of just how valuable mere data is, and why one must go to great lengths for protecting it equally.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to ColdLock Ransomware may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Posted: May 13, 2020
Home Malware Programs Ransomware ColdLock Ransomware

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.