Home Malware Programs Ransomware Crash Ransomware

Crash Ransomware

Posted: July 9, 2019

The Crash Ransomware is a file-locking Trojan that can hold your digital media hostage by encrypting the files. The Crash Ransomware is a member of a Ransomware-as-a-Service family that includes features such as multi-format ransom demands and erasing Windows backups. Restore your files through secure backup devices and use anti-malware software for deleting the Crash Ransomware safely.

RaaS Gets Another Crash-Landing into Your Files

Ransomware-as-a-Service remains dominated by a select handful of large-name players, such as the Dharma Ransomware division of the Crysis Ransomware. An Italian version of the threat, the Crash Ransomware, is targeting users by unknown exploits in 2019's summer season. However, it's hardly the only version of its family that's in the wild – it's competing against relatives like the equally-new KICK Ransomware, and the older 0day Ransomware, LDPR Ransomware, and 4k Ransomware.

The Crash Ransomware's payload includes the widely-expected, data-encrypting attack that blocks files with AES-256 and secures it with RSA afterward. This well-known feature of most file-locker Trojans will prevent the content from opening until the user decrypts it with a specialized application and code. The Crash Ransomware adds 'crash' extensions and ransom-related details to their filenames for additional clarification.

Attacks by the Crash Ransomware can harm more than local files and can include the system's plugged-in, removable devices and local network shares. Data types that are at risk from this blockade include documents, images, archives, and most, other media, besides the Trojan, itself, and the Windows operating system. Malware experts, also, continue warning that this Trojan family will delete the Shadow Volume Copies.

A Safe Roll Out of a High-Speed Crash Ransomware Infection

Infection exploits that the threat actors of the Crash Ransomware's family use can involve misinformed consent from the victim or no consent at all. In former cases, the most likely vector is an e-mail message that contains a corrupted link or document, although torrents and fake updates on compromised sites can serve the Trojan, as well. For the latter, malware experts find the presence of unsecured RDP features, default port settings, outdated software, and default passwords as the usual, enabling factors.

Security software can identify Black Hat URLs and the Trojan droppers in corrupted e-mail downloads. Users also should avoid enabling macros in spreadsheets or documents, if it's possible. Server administrators can use complex passwords, update the server software, and disable RDP or use other security features, such as multi-factor authentication.

The Dharma Ransomware family has limited anti-AV features and relies, mostly, on attacking a poorly-defended target. Most anti-malware products should remove the Crash Ransomware or stop an attack from occurring, as long as they're active.

While malware experts can verify just one country with the Crash Ransomware infections, the Dharma Ransomware is, unfortunately, worldwide. Everyone needs a backup plan for their data, assuming that they'd rather not pay to get it back.

Related Posts

Loading...