Home Malware Programs Ransomware CryptoPokemon Ransomware

CryptoPokemon Ransomware

Posted: April 11, 2019

The CryptoPokemon Ransomware is a file-locking Trojan that encrypts your documents and other media while it shows a ransom message for Bitcoin payments. Users can recover their files through backups or public decryption solutions freely and should ignore the ransoming note. Before doing so, however, removing the CryptoPokemon Ransomware through an anti-malware service will stop the locking of any further content or interference with the recovery process.

Gotta Encrypt 'Em All

The CryptoPokemon Ransomware is joining old threats like the Pokemon GO Ransomware, the DetoxCrypto RansomwarePileFile Reminder PUP as a security problem that's happily using the Pokemon brand for inappropriate purposes. Analyses from malware experts show not many special functions in the fundamentals of the CryptoPokemon Ransomware's attacks, which aren't that different from those of Hidden Tear, the Globe Ransomware, or other, similarly-popular options for file-locker Trojans. However, it appears coded independently without a close connection to any of the traditional families of this threat category.

The CryptoPokemon Ransomware encrypts the user's files with AES-128 and SHA-256, keeping them from opening and flagging their names with '.CRYPTOPOKEMON' extensions. Media types such as JPG pictures, DOC documents, and other content are at risk, although, as usual, the CryptoPokemon Ransomware doesn't intentionally harm the Windows OS. After the attack finishes, the CryptoPokemon Ransomware displays a UI with its ransoming message.

According to this pop-up, the CryptoPokemon Ransomware sells its decryption service for 0.02 Bitcoins. The wallet it specifies doesn't have any activity that would correlate to victims paying, but is in use, with verifiable transactions. The threat actors are calling themselves the 'PokemonGo team,' which may imply a theme to its infection strategies, although most Windows devices are vulnerable. Any victims should avoid paying for reasons elaborated on further in this article.

Breaking Your Files Out of the CryptoPokemon Ransomware's Pokeball

All users should keep appropriately-secure backups for recovering from file-locker Trojans or, even worse, wipers. However, even those without this common-sense solution to a the CryptoPokemon Ransomware infection should be capable of repairing their files from the current versions of the Trojan. Significant encryption method flaws in the CryptoPokemon Ransomware's payload make this threat easily decryptable, and free software is getting hosting from the cyber-security sector for undoing the 'locking' effects of its attacks.

The CryptoPokemon Ransomware's distribution exploits are in flux, although its development may be incomplete – since its UI lacks the usual brand images that most threat actors prefer for their ransoming pop-ups. Users should scan e-mail attachments, disable hazardous browser features like JavaScript, and be careful around downloading resources, such as torrents, that can put their systems at risk. Any traditional anti-malware program should find no challenges in deleting the CryptoPokemon Ransomware automatically and stopping any more attacks against your files.

The solution to a the CryptoPokemon Ransomware infection is as easy as looking around the Web for already-hosted services on decrypting the files that it takes hostage. Readers should remain hopeful that any updates to the CryptoPokemon Ransomware will not make its capturing methods as impenetrable as that of the typical pokemon-capturing ball.

Loading...