Fabsyscrypto Ransomware
Posted: March 8, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 78 |
First Seen: | March 8, 2017 |
---|---|
OS(es) Affected: | Windows |
The FabSysCrypto Ransomware is a variant of the Hidden Tear family, a set of ex-public domain source code that lets software encrypt and lock files from opening. The FabSysCrypto Ransomware's authors are using these capabilities to collect ransoms, which malware experts recommend not paying, when possible. Use backups or free decryptors to recover your content, but only after uninstalling the FabSysCrypto Ransomware with a professional anti-malware product.
Newly-Modified Trojans Crying for Money
Malware researchers can confirm one of the first re-releases of Hidden Tear, a particularly abundant Trojan family, for March. While the FabSysCrypto Ransomware copies all the information that it gives to its victims in text from other campaigns, such as the one for the Locky Ransomware, it also delivers real, data-enciphering attacks. Such attacks can prevent you from opening files like documents until you use one of a limited means of restoring them to their previous formats.
The FabSysCrypto Ransomware's author hasn't modified the Trojan to use encryption methods beyond those default to Hidden Tear, which leverages AES encoding algorithms. Malware researchers verify the FabSysCrypto Ransomware's encryption list for including such formats as DOC, JPG, TXT, PNG, and others in use by major brands of software not integral to your operating system. The Trojan also will append a '.locked' extension onto each file's name, although the change isn't a legitimate format conversion and doesn't overwrite the original name's contents.
The FabSysCrypto Ransomware also creates a Notepad file through which it transmits its ransom demands. Any victims should be aware that the FabSysCrypto Ransomware uses a copy-pasted notice that is known for providing inaccurate encryption data, and paying any fee may not give them a real decryptor to unlock their files.
The 'Important Information' that Trojans will not Say
The FabSysCrypto Ransomware's author choice an extortion message that clearly communicates its request while educating any readers who are unaware of the concept of the files being lockable behind an encryption-based cipher. On the other hand, like most file-encryptors malware experts find, the FabSysCrypto Ransomware also overstates the unbreakable qualities of its encryption attack and leaves other, vital info out of its 'important information' Notepad file. PC users in need of decryption help should look for assistance from cyber security experts with experience fighting file-encryption Trojans instead of paying a ransom.
Although the Hidden Tear family is susceptible to free decryption solutions, con artists sometimes modify their variants of old Trojans to make them less vulnerable. PC users backing up their files can remove the uncertainty of whether or not they can recover fully after attacks by Trojans of this classification. Alternately, anti-malware products can delete the FabSysCrypto Ransomware before it infects your PC.
The future viability of Hidden Tear Trojans largely remains in the hands of the people under attack by past threats of this family. Until threats like the FabSysCrypto Ransomware fail to collect their ransoms, PC owners can expect to contend with new Hidden Tear-based campaigns.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.