Home Malware Programs Ransomware CryptoSpider Ransomware

CryptoSpider Ransomware

Posted: June 16, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 7
First Seen: June 16, 2017
OS(es) Affected: Windows


The CryptoSpider Ransomware is a modified Trojan from the Hidden Tear family, which demonstrates the potency of file-encrypting attacks and their accompanying ransom tactics. Infected PCs may show symptoms such as being unable to open files, hijacked background images or pop-ups asking for money. Free decryption programs and backups can help you recover anything that the CryptoSpider Ransomware damages and various anti-malware products may remove the CryptoSpider Ransomware while protecting your computer.

The Itsy Bitsy Trojan Crept Up into Your PC

A threat actor is building a new edition of Hidden Tear to compete with the dozens of already existing ones on the Web. However, its authors appear to be designing the campaign with more than a minimum of effort and include some graphic design elements and strong brand imagery to support the payload. This new CryptoSpider Ransomware is incomplete but would require little extra work before being viable for distribution.

The CryptoSpider Ransomware could compromise a PC through such methods as exploit kits running through your Web browser or e-mail attachments that install the Trojan via document-based security loopholes. Malware researchers recommend looking for symptoms encompassing all of the following attacks, many of which the CryptoSpider Ransomware shares with other Hidden Tear variants:

  • Your PC's background wallpaper may reset itself to a BMP graphic that the CryptoSpider Ransomware drops. The image displays a generic 'hacked' alert, along with the Trojan campaign's mascot, a 'Mr. Ghost C-47' cat.
  • The CryptoSpider Ransomware may deliver demands for ransom money to provide you with a decryption key for reversing its data-damaging attack (see below). It can convey its extortion instructions through Notepad files, HTML pop-up windows and similar text.
  • Before showing any of these symptoms, however, the CryptoSpider Ransomware also encrypts different files on your PC, typically focusing on graphical, audio and text-related media. Victims may tell which files are non-working by searching for the '.Cspider' extensions that malware researchers don't connect with any other Trojan campaigns.

Untangling a Web of Underground Money

Because the CryptoSpider Ransomware has no verifiable incidents of attacking possible victims, like for-profit business servers, its author is likely still to be polishing its payload, such as the ransom transaction mechanisms. Despite its incompleteness, malware researchers warn that the CryptoSpider Ransomware could be in deployment almost immediately, using file-damaging attacks that may not be by fixable with generic Hidden Tear decryptors necessarily. Although local backups always are at high risk of being deleted by file-encrypting threats, remote ones should let you restore everything after you disinfect the PC.

User error often is at fault for the security compromises of any device, but particularly for campaigns with threats of this classification. Malware researchers suggest scanning all downloads, disabling non-essential browser scripts, and keeping document macros turned off, to help protect your PC. The Hidden Tear family isn't notably evasive or obfuscated, and most anti-malware programs should quarantine or uninstall the CryptoSpider Ransomware immediately.

The time that threat actors put into the visual design of their Trojans often correlates with how much use they intend to get out of them. Users should be ready to protect their documents and other media from new threats like the CryptoSpider Ransomware, which may crawl through the Web sooner, rather than later.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 762.88 KB (762880 bytes)
MD5: b18c5af696e8847241e4c17230db36c9
Detection count: 20
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: June 16, 2017
Loading...