Home Malware Programs Ransomware CryptoLocker3 Ransomware

CryptoLocker3 Ransomware

Posted: December 28, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 10
First Seen: December 28, 2016
OS(es) Affected: Windows

The Cryptolocker3 Ransomware or PClock is a Trojan that imitates the identity of CryptoLocker while also locking your files until you make a Bitcoin payment. Since the Cryptolocker3 Ransomware's built-in decryptor is no more effective than options found elsewhere at no charge, malware experts suggest that you withhold the ransom money, when possible. Some anti-malware products also can delete the Cryptolocker3 Ransomware during its installation process or afterward, although they may require updates for identifying this new threat.

Trojans Still Use Other Trojans for Cover

The history of CryptoLocker extends long past the last verifiable evidence of its activities in the wild. New threats with similar avenues of attack, such as the Cryptolocker3 Ransomware, continue marketing themselves as being updates of Cryptolocker falsely even though there's no technical basis for a relationship. With the Cryptolocker3 Ransomware, this goes as far as merging the misappropriated brand identity with its choices of filename labels and ransom notices.

The Cryptolocker3 Ransomware uses an XOR-based encryption method and may scan for various file formats to lock, including JPG, PPT, CDR, XLS, RAW, DOC and MDF. Although malware researchers have yet to see the Cryptolocker3 Ransomware damaging executable ('.exe') content, the Cryptolocker3 Ransomware does include the Program Files directory in its scans along with the Windows 'user' folder.

Files that the Cryptolocker3 Ransomware encrypts also acquire new '.cryptolocker' extensions and different variants of the Cryptolocker3 Ransomware may or may not replace your desktop background with an image of their choice additionally. Its last function with symptoms visible to the victim is the creation of an HTA pop-up that checks for Bitcoin ransom payments automatically. The pop-up continues the ruse of the Cryptolocker3 Ransomware supposedly being a new version of Cryptolocker and provides a complete text list (either 'encrypted.txt' or 'enc_files.txt') of all your blocked content.

Giving Masked Threats the Only Pay It Deserves

So far, seven variants of the Cryptolocker3 Ransomware are in distribution in the wild. Given the short time frame between its identification and the updates, different threat actors most likely are paying for the privilege of distributing custom versions of the Cryptolocker3 Ransomware to new targets according to their preferences. Most versions will erase local backup and SVC data, increasing the difficulty of data recovery without using non-local backups. Malware researchers are finding most versions of the Cryptolocker3 Ransomware are vulnerable to free decryption programs. The remainder is equally unresponsive to both free utilities and the built-in decryptor, meaning that any victims gain nothing from paying the Cryptolocker3 Ransomware's Bitcoin fee. Catching and deleting the Cryptolocker3 Ransomware with anti-malware products before it can cause any harm is, as always, the strategy malware experts most freely endorse.

Whether it calls itself 'Cryptolocker' or another name, the Cryptolocker3 Ransomware can block and even damage your PC's files permanently. Taking the safety of valuable documents or images for granted can come with a price that's all too easy to ignore until it's too late.

Loading...