Home Malware Programs Ransomware CrystalCrypt Ransomware

CrystalCrypt Ransomware

Posted: June 1, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 81
First Seen: June 1, 2017
OS(es) Affected: Windows


The CrystalCrypt Ransomware is a Trojan that can lock your files by encrypting them, concluding with a text message asking for Bitcoins for the decryption solution. PC users can try freeing data retrieval methods to recover from any damage this threat inflicts or preventing its attacks by adhering to the proper security protocols. Most anti-malware applications may delete the CrystalCrypt Ransomware after identifying it heuristically.

All the Fun of Having Your Files Taken Hostage

The final week of May remains a busy one for threat actors disseminating non-consensual encryption payloads, which can hold the files of a PC hostage until the user meets arbitrary conditions. The CrystalCrypt Ransomware is one of the most recently confirmed of such threats without any relatives verifiable directly, although some members of the PC security sector speculate of a relationship to last month's LightningCrypt Ransomware. Whether it's a minor variant or a wholly new Trojan, the CrystalCrypt Ransomware continues demonstrating how easy it is to code non-consensual encryption attacks.

Some aspects of the CrystalCrypt Ransomware's behavior imply that its administrators are using Remote Desktop attacks to install the Trojan or related threats. Whether or not this is true for current infections, the CrystalCrypt Ransomware also initiates network connections for purposes such as downloading its configuration parameters or uploading a customized ID to a C&C server. When its setup activities complete preliminary, the CrystalCrypt Ransomware proceeds with encrypting files in locations such as the user's Downloads and Documents folders.

The encoding attack prevents all affected media from being readable, and users can identify it through the '.BLOCKED' extensions that the CrystalCrypt Ransomware appends to every name. The Trojan's payload also includes support for a Notepad-based ransoming message that malware experts note as being deposited on the desktop and opening automatically. This text includes a warning about deletion for victims who try to 'do anything,' payment instructions, and a tongue-in-cheek recommendation to 'have fun.'

Taking the Shine Off of a Crystal Trojan's Campaign

To those not familiar with cryptocurrency exchange rates, the fraction of a Bitcoin that the CrystalCrypt Ransomware demands may sound like a bargain for restoring your files. However, 0.17 Bitcoins converts to over 400 USD under current rates, and the victim can't refund it if the threat actor chooses not to help with the decryption. Such expensive hazards cause malware analysts to encourage all other methods of recovery in preference ordinarily, such as using free decryption software or a backup that the CrystalCrypt Ransomware hasn't damaged.

Like many file-encrypting Trojans, the CrystalCrypt Ransomware may compromise local network-accessible drives or delete localized backups. You should password protect your backups or store them on devices not attached directly to a system with Web connectivity for reducing this threat's scope for damage. Although this Trojan is newly-identified, an updated anti-malware program may delete the CrystalCrypt Ransomware before its encryption routine can finish loading.

As a matter of habit, threat actors will lie about the attacks their Trojans can commit while extorting money. However, non-consensual file deletion is a simple function even low-level threats can accomplish, and PC users are advised not to assume that every Trojan like the CrystalCrypt Ransomware is bluffing.

Loading...