Home Malware Programs Ransomware 'cypher File Extension Ransomware

'cypher File Extension Ransomware

Posted: December 19, 2018

The '.cypher File Extension' Ransomware is a file-locker Trojan: a threat that encrypts different media content, such as text documents, compressed archives, images or music, and holds them for ransom. Users can try restoring their work through a default backup, a non-local one, or a free decryption utility, as is appropriate. Most anti-malware programs should remove the '.cypher File Extension' Ransomware safely and without its attacks loading.

Software Villainy is under a Heroic Mask

A file-locking Trojan is collecting the brand-name of Spanish pulp hero Zorro for itself, making it not the introductory one, but one of the few Trojans of its kind that subverts vigilante fiction media for a campaign. The program, the '.cypher File Extension' Ransomware, is 32-bit Windows software that operates similarly to Hidden Tear or the Globe Ransomware, by blocking content before depositing a text file and telling the victims that they should contact the provided e-mail. Even paying a ransom, however, isn't an automatic or safe 'purchase' of the decryption program that could restore the blocked files.

Besides the coincidence of its executable's name, the '.cypher File Extension' Ransomware has few characteristics in kind with the Zorro Ransomware of early 2017. Just as one would assume from its title, the '.cypher File Extension' Ransomware uses a new extension and a very different ransom note that doesn't specify the price, unlike Zorro Ransomware's concrete Bitcoin demands. It tells the users where to find the local file with their infection ID and gives out an e-mail address for the ransoming negotiations. They should try to avoid paying since most threat actors will take the money without any regard for whether or not the victim can unlock their files afterward.

Malware experts can't confirm the '.cypher File Extension' Ransomware's deleting the Windows Restore Points, which could be helpful for recovering any documents and other media that this Trojan blocks with its encryption. Encrypting attacks, typically, will run through hidden, background components, either via an injection into other processes or by pretending that they're native Windows programs like the universal 'Svchost.exe.' The victims, also, may contact available cyber-security experts for their analysis of the '.cypher File Extension' Ransomware's vulnerability to the Web's variety of free decryption solutions.

Taking the Puzzling Out of a Cipher

File-locking Trojans can infect your computer through multiple methods that are both effective and prominent in 2018 statistically, and expected of being so in the coming year equally. Spammed e-mail messages, especially ones carrying attached documents, and brute-force attacks that break into login credentials are the exploits of preference against business networks, NGOs and even government systems. Average users, however, should concern themselves equally if not more so with exploit kits that use Flash or JavaScript attacks through their browsers, as well as torrents and other, illicit downloading resources.

A good variety of anti-malware programs are detecting the '.cypher File Extension' Ransomware's current builds without any issues. Most of them are employing generic heuristics for doing so as a result of the '.cypher File Extension' Ransomware's strong resemblance to other threats, like Hidden Tear, regarding its main features. Systems with such protection should be deleting the '.cypher File Extension' Ransomware before it becomes threatening to any of their media.

There may be more worth puzzling about for this anti-heroic software's new campaign. A file-locking Trojan like the '.cypher File Extension' Ransomware, no matter how mysterious it is, can be kept from being threatening with little more than the most vanilla security habits and an occasional, manual backup.

Loading...