Home Malware Programs Ransomware CryptoCat Ransomware

CryptoCat Ransomware

Posted: September 16, 2016

Threat Metric

Threat Level: 5/10
Infected PCs: 69
First Seen: September 16, 2016
OS(es) Affected: Windows

The CryptoCat Ransomware is a Trojan that encrypts your files and creates a message demanding a ransom for decrypting them back to a usable format. Con artists often fail to honor these transactions or provide decryptors that malfunction and malware experts recommend using different solutions for restoring your information, if possible. Besides guarding against common infection vectors, you can use standard anti-malware protection to block the CryptoCat Ransomware's payload or remove this threat from your computer.

The New Threat Pouncing on Your Files

Con artists interested in profiting quickly often find creative ways of taking advantage of the value inherent in possessions that don't belong to them. In previous years, the threat industry often implemented this line of attack in the form of denying access to your computer, such as by the simple expedient of launching pop-ups that block your desktop. Recent versions of 'ransomware' style Trojans are more likely to target your data directly, as malware experts see with threats like the CryptoCat Ransomware.

The CryptoCat Ransomware (not related to the now-defunct the CryptoCat browser extension, which facilitates privacy-protected chats) scans for files on your local drives fitting into formats included in its whitelist. Although con artists may reconfigure the CryptoCat Ransomware for targeting different types of data, some of the usual cases malware experts can point out include Word documents, compressed archives, Excel spreadsheets, and most widely-used forms of images and audio content. After finding these files, the Trojan encrypts them with an algorithm yet to be identified, blocking you from opening them.

The Trojan also creates new files for the victim: Notepad TXT messages using formats that readers may recognize from other, similar campaigns. The contents of the instructions demand a ransom payment within a week before the threat actors delete the key required for decrypting your data. Like most con artists, the CryptoCat Ransomware's authors prefer Bitcoin payments, which, in theory, guarantee their anonymity

What to Do When the Cat's out of the Bag (and in Your Files)

Most file encrypting Trojans display determinable symptoms after their attack functions complete their intended purposes, and malware experts find no exception to this rule in any samples of the CryptoCat Ransomware. PC owners may detect the CryptoCat Ransomware by looking for its ransom message ('Your files are locked !.txt'), by identifying encrypted and blocked content, and by looking for data bearing the '.the CryptoCat' extension.

Readers should note that although the CryptoCat Ransomware claims to use an RSA-2048 algorithm as part of its encryption routine, its self-description is part of a widely-reused text that's unlikely of being accurate to this Trojan's payload. You can contact appropriate members of the PC security sector for help with decrypting your content without paying the CryptoCat Ransomware's ransom. In other cases, restoring content from an unencrypted backup may be your sole restoration option.

Victims paying this con artist fee and victims availing themselves of free recovery solutions alike should use anti-malware software for deleting the CryptoCat Ransomware and halting any further encryption attacks. However, with threats like the CryptoCat Ransomware being as prone to fecundity as real cats, being wary of the most common security vulnerabilities enabling a Trojan's installation is equally important.

Loading...