Home Malware Programs Ransomware 'corpseworm@protonmail.com' Ransomware

'corpseworm@protonmail.com' Ransomware

Posted: November 7, 2019

The 'corpseworm@protonmail.com' Ransomware is a file-locking Trojan that's a part of the Cryakl Ransomware family. The 'corpseworm@protonmail.com' Ransomware can keep files on your PC from opening and may collect information for letting threat actors access network-available systems and others' accounts. Users always should maintain backups for recovering from such an attack quickly, although many anti-malware products can find and remove the 'corpseworm@protonmail.com' Ransomware as necessity dictates.

Finding the Original Trojan behind Changing Names

Variants of file-locking Trojans exhibit incredible diversity, such as modifications of the Jigsaw Ransomware or Hidden Tear, the countless re-releases of Ransomware-as-a-Services like the Globe Ransomware, and smaller groups like the Cryakl Ransomware. A new remix of the last of these examples is finding itself in threat databases currently. Malware experts can't confirm how it's circulating, but its features offer open possibilities for thievery.

As a new edition of the Cryakl Ransomware, the 'corpseworm@protonmail.com' Ransomware runs attacks with the same intention of encrypting, and, then, ransoming, files. The current UI that malware experts confirm suggests that the 'corpseworm@protonmail.com' Ransomware is being run manually after an attacker gains access to a network and rates it as valuable enough for the extortion. Besides encrypting and blocking files, the 'corpseworm@protonmail.com' Ransomware also adds a software build number, an e-mail and a random extension into the names.

Note that this family doesn't consist of a single progenitor and the 'corpseworm@protonmail.com' Ransomware update; other members include the Cs16 Ransomware, the '.doubleoffset File Extension' Ransomware and the '.fairytail File Extension' Ransomware. Some of these Trojans are compatible with an available Cryakl unlocking program, while others, like the 'corpseworm@protonmail.com' Ransomware, could be too new or secure for unlocking freely.

A Preventative for Worms Feeding on Your Files

While cures to encryption are an often-elusive holy grail for cyber-security researchers, other means of protecting one's files are readily available for everyone. Backing up content to another device that isn't available to users on Internet-connected machines, or has additional security, will make a haven for any data that the 'corpseworm@protonmail.com' Ransomware might attack. Although malware experts can't confirm the 'corpseworm@protonmail.com' Ransomware's removing the Restore Points, such behavior is a part of most file-locking Trojans' payloads, and all Windows users should anticipate it.

Workers can help with securing their networks by avoiding contact with unsafe e-mail content or obfuscated social messaging links. Furthermore, attachments involving macros within documents and spreadsheets are very susceptible to abuse and drive-by-download attacks. Updating software also can help prevent many of the vulnerabilities known to threat actors from becoming infection vectors.

The Cryakl Ransomware is quieter than, for instance, the Dharma Ransomware's booming business, but it's still a present threat. As proof of that assertion, the 'corpseworm@protonmail.com' Ransomware is more than ready for extorting money out of those who don't protect themselves.

Loading...