Home Malware Programs Ransomware CypherPy Ransomware

CypherPy Ransomware

Posted: September 29, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 8
First Seen: September 29, 2017
OS(es) Affected: Windows

The CypherPy Ransomware is a file-locking Trojan that encodes your media with an AES-based cipher. In addition to issues with opening content, other symptoms that users may see during a CypherPy Ransomware infection include changes to the names of their media, the appearance of ransom-themed text messages, or pop-ups that can block the entire screen. Malware experts recommend blocking and removing the CypherPy Ransomware preemptively with security programs that can prevent any data loss from occurring.

Serpentine Software with Cross-Compatible Fangs

It's not very frequent for con artists to bother with coding Trojans with compatibility for multiple operating systems, but the recently-detected skeleton code of a new threat is implying nothing less than that. The condensed, Python-based file shows a Trojan that can run inside of both Windows and Linux environments, with a payload that's well-adapted for blocking data and extorting money. While malware experts have found no live-environment attacks using the CypherPy Ransomware, the Trojan may be ready for deployment at any time.

The CypherPy Ransomware uses a Cipher Block Chaining or CBC mode variant of AES to encipher the media of the infected PC. Besides blocking the usual formats of files, such as PDF documents, movies, and compressed archives, the CypherPy Ransomware also attacks the program executable and content related to smartphones like 3G2. Current samples of the CypherPy Ransomware append '.crypt' extensions to these files as identifying tags for what content will not open.

Since all samples of the CypherPy Ransomware available for malware experts' analysis are works-in-progress, they can give very little information on the status of any demands it might make for decoding the files. However, the CypherPy Ransomware does use a copy-pasted assertion about 'military-grade encryption' to threaten its victims, which implies that its author intends to thwart free decryption attempts and collect money from the decryption solution he endorses, instead.

Loosening the Coils of a Python-Based Trojan

While it's not in a state that one would describe as being finished, the CypherPy Ransomware already exhibits cross-platform, file-blocking attacks that can damage software and more data types, such as pictures, before any of the symptoms of an infection become detectable. Malware experts also warn that updates to your security programs may be mandatory for identifying the CypherPy Ransomware, which is showing high success rates against current detection methods in use by most anti-virus vendors.

The most recent samples of the CypherPy Ransomware are using the 'prettyflypassword' password to block the user from decrypting and unlocking their files with the default module. Any users experiencing further difficulties with restoring their content should contact security researchers with backgrounds in file-locking Trojans for help, or revert to their last backup. Due to its particular compatibility with mobile phone environments, users should be careful on their phones equally, as well as their PCs, when dealing with potential infection vectors like email attachments. Updated anti-malware programs also may remove the CypherPy Ransomware before it can encrypt any data.

With so many data-encrypting attacks targeting the computer servers of both smaller and larger businesses, it can be easy to forget that other devices and operating systems also are vulnerable. The CypherPy Ransomware and Trojans very similar to it are only likely to become more common and problematic as threat actors gain more experience with abusing them.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



dir\name.py File name: name.py
Size: 6.03 KB (6030 bytes)
MD5: dc8e87369f835f9a0d86906f74b42ae4
Detection count: 70
Mime Type: unknown/py
Path: dir
Group: Malware file
Last Updated: October 2, 2017
Loading...