Home Malware Programs Ransomware CyborgLock Ransomware

CyborgLock Ransomware

Posted: November 20, 2019

The CyborgLock Ransomware is a file-locking Trojan that can block files through encryption and demands ransoms in text messages. Users should treat it as a threat to any saved media on their systems and maintain backups for protecting any essential work from its attacks. Standard anti-malware products should remove the CyborgLock Ransomware automatically, as with similar Trojans.

The Cyborg Assaulting Files for Gift Cards

A new, file-locking Trojan that's not an obvious remix of Hidden Tear or a Ransomware-as-a-Service byproduct is in its developmental stages, with most AV vendors detecting it incorrectly as a variant of the Neshta virus. The CyborgLock Ransomware is a much more amateurish project even than the widespread Hidden Tear, but it offers similar dangers despite its low-level programming. Any victim of a CyborgLock Ransomware infection without a backup may lose their files forever.

The CyborgLock Ransomware is a Windows program that, like similar Trojans, uses encryption for blocking media, which can include anything from a Word document to compressed archives or server databases. The CyborgLock Ransomware marks these files as being unusable by prepending its string of 'Lock.Cyborg' into the names, which is a behavior reminiscent of the campaigns of the Kasiski Ransomware, the Dablio Ransomware, and others. Malware experts can't determine whether or not the CyborgLock Ransomware wipes the Restore Points, although it does open the CMD utility currently – which is, often, a precursor to that data-erasing attack.

The CyborgLock Ransomware also includes multiple ransom notes in Notepad. These English instructions include demands for both Bitcoins and, very atypically, Amazon gift cards. They also contain numerous grammar and spelling issues and aren't using a standard template, such as the formats of the Scarab Ransomware or another Ransomware-as-a-Service business.

Breaking a Criminal's Media Locks Beforehand

The CyborgLock Ransomware might be a tempting threat to surrender money to, compared to other file-locking Trojans with more expensive aims. It asks for just over one hundred USD and is, accordingly, less costly than a RaaS extortion. However, paying remains a questionable retrieval method for any data since the criminal could keep his prize without responding afterward.

For the safety of any files worth paying ransom for, malware experts recommend keeping backups maintained in multiple and non-local locations. Removable devices, network-attached storage, and cloud storage services can provide a sure means of sparing your media from encryption. Current samples of the CyborgLock Ransomware require further investigation for confirming whether or not the CyborgLock Ransomware's cryptography is, in fact, breakable by a third party. The arrival of a new Trojan for Windows systems is no surprise, except, perhaps, for the roughshod level of the CyborgLock Ransomware's linguistics. However, since internal data implies that the programmer is Russian, there's no telling where its shaky ransom notes will, ultimately, end up.

Loading...