‘.ecc File Extension’ Ransomware

Posted: January 20, 2016
Threat Metric
Threat Level: 10/10
Infected PCs 7

‘.ecc File Extension’ Ransomware Description

The '.ecc File Extension' Ransomware is a threat that encrypts your files, making them unusable in the process, after which the '.ecc File Extension' Ransomware attempts to sell its victims an expensive decryption service being run by its admins. There is a high likelihood of the '.ecc File Extension' Ransomware removing local backup information simultaneously, but remote backups are a free alternative to using a file decryptor. Dedicated anti-malware tools always should be involved with uninstalling the '.ecc File Extension' Ransomware.

The New Scope of Targets for Modern Ransomware

The '.ecc File Extension' Ransomware is a probable derivative of past threats basing themselves on the TeslaCrypt, and the '.ecc File Extension' Ransomware uses the same style of attacks with only minor changes to its external symptoms. Although the TeslaCrypt Ransomware is perhaps most famous for targeting gaming software, malware analysts see the '.ecc File Extension' Ransomware attacks against more conventional targets: Microsoft Office documents (DOC, DOCX, etc.). As usual, the '.ecc File Extension' Ransomware scans the local drives for files of these types without the victim's input and immediately runs them through an encryption algorithm designed for making them unusable.

Although the '.ecc File Extension' Ransomware's payload includes changing file extension names to its '.ecc' file type, this change is wholly cosmetic, and renaming your files will not reverse the encryption of their underlying data. The '.ecc File Extension' Ransomware also launches ransom messages simultaneously with any attempt at opening these files, which exposes the victim to a file-ransoming tactic processing itself through Bitcoin transactions. Local backup information and, in particular, any Windows restore points, also may be deleted, blocking the most direct means of recovering your files.

The '.ecc File Extension' Ransomware's administrators or affiliated third parties also have developed variants of this file-encrypting Trojan, which may use different extensions or encryption defenses. Some of these clones include '.ttt File Extension' Ransomware, the '.xyz File Extension' Ransomware and '.xxx File Extension' Ransomware.

Curbing Ransomware's Newest Extensions

Anyone considering paying the '.ecc File Extension' Ransomware's ransom should be made aware of the availability of free TeslaCrypt Ransomware decryptors, such as TeslaDecoder, that are effective for the '.ecc File Extension' Ransomware and some (but not all) variants of the same threat. However, malware development for file encryptors often includes updates for blocking old decryption utilities. Other methods of protecting your private data from a the '.ecc File Extension' Ransomware attack include using removable hard drives or remote servers for backup purposes.

As always, resolving the consequences of a the '.ecc File Extension' Ransomware infection is less important than knowing how to prevent one. General safety tips malware analysts recommend using include blocking browser scripts, scanning suspicious e-mail attachments and ignoring questionable social networking links. Most PC owners should remove the '.ecc File Extension' Ransomware and all related threats before making any efforts towards restoring their files. Fortunately, despite the barrage of 2015 to 2016 updates, the '.ecc File Extension' Ransomware has shown no signs of being any more difficult for anti-malware products to identify than usual.

Despite the implications of the ECC extension, the '.ecc File Extension' Ransomware has no formal relationship with elliptic curve cryptography or the mobile platforms that are most vulnerable to it.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to ‘.ecc File Extension’ Ransomware may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:

file.bmp File name: file.bmp
Size: 71.71 KB (71712 bytes)
MD5: c579341f86f7e962719c7113943bb6e4
Detection count: 21
Mime Type: unknown/bmp
Group: Malware file
Home Malware Programs Ransomware ‘.ecc File Extension’ Ransomware

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.