Home Malware Programs Ransomware 'DIGITALKEY@163.com' Ransomware

'DIGITALKEY@163.com' Ransomware

Posted: October 20, 2016

The 'DIGITALKEY@163.com' Ransomware is a Trojan that uses encryption algorithms for encoding and blocking your PC's data. Con artists may offer to help repair your PC or recover your data after these attacks, which often include messages redirecting you to their e-mail addresses or websites. With the decryption possibilities against this campaign limited currently, malware experts advise having an anti-malware product that can stop and remove the 'DIGITALKEY@163.com' Ransomware without giving it a chance to attack.

Another Trojan Happy to Keep What's Yours Under Lock and Key

Widespread, flexible and efficient proliferation is one of the keystone traits of the modern black market for Trojans using file encryption. As threat actors recycle old code with minor changes for personalizing their cash flows, resources like the EDA2 and Hidden Tear can result in dozens or even hundreds of disconnected campaigns. Malware researchers could incline readers towards one of their latest examples, the 'DIGITALKEY@163.com' Ransomware, which uses a format indicating a previous association with the CrySiS family.

tTe 'DIGITALKEY@163.com' Ransomware attacks work media-related formats of data, such as documents, and has yet to be seen harming critical software, such as the baseline components of the Windows OS. For files that do fall within the 'disposable' categories determined in the 'DIGITALKEY@163.com' Ransomware's scan, the Trojan leverages an encryption algorithm, such as the AES-128, to modify and block them.

While the 'DIGITALKEY@163.com' Ransomware doesn't erase the original name of each piece of data, it does include its personal additions: a string of random characters, its e-mail contact and the '.xtbl' extension. These signs all conform to the usual standards of CrySiS builder-based threats, although some of them, such as the extension, also are present in additional families. Victims are expected to use the e-mail address for entering into ransom negotiations for their information, although the Trojan offers no promises of a secure decryption process.

Lock Picking Alternatives to a Trojan's Overpriced Keys

The 'DIGITALKEY@163.com' Ransomware is far from the first Trojan to owe an apparent debt in its development to the threats of the recent past. In spite of being a known threat whose payload has a minimum of changes from other CrySiS-based Trojans, the 'DIGITALKEY@163.com' Ransomware does not have an available decryption solution outside of con artist possession. Paying DIGITALKEY@163.com' Ransomware's threat actor may not give a satisfactory data recovery solution necessarily, which is why malware researchers always encourage using backup services.

The 'DIGITALKEY@163.com' Ransomware has limited distribution to date, with only a few entities that malware researchers can verify as being affected. In addition to letting your anti-malware tools scan any incoming files, you also should consider practical safety steps, such as using complex passwords, blocking website scripts and avoiding file attachments with duplicitous origins. Even anti-malware products able to remove the 'DIGITALKEY@163.com' Ransomware without any trouble will not offer decryption services, which software developers always delegate to highly-specialized tools.

Originality plays little part in the 'DIGITALKEY@163.com' Ransomware's design, but neither does it need a place in the Trojan's campaign. Even derivative, traditional Trojans like the 'DIGITALKEY@163.com' Ransomware can instigate damages with costs that are left to the victim to calculate.

Loading...