Home Malware Programs Ransomware File Spider Ransomware

File Spider Ransomware

Posted: December 11, 2017

Threat Metric

Threat Level: 6/10
Infected PCs: 0
First Seen: August 8, 2022
Last Seen: June 3, 2023
OS(es) Affected: Windows

The File Spider Ransomware is a file-locking Trojan that can block your ability to open various media formats. This threat uses a website-based ransoming mechanism for selling its decryption key and often is distributed in corrupted documents. Default responses for all PC users should include having their anti-malware products delete the File Spider Ransomware preemptively and using backups as a free substitute for paying its cryptocurrency fee.

Trojans Building Webs for Bitcoins

Some unusually innovative threat actors are administering a campaign that uses an entirely new brand of file-locking threat, the File Spider Ransomware, for converting encryption attacks into money. While the File Spider Ransomware is not a member of families like Hidden Tear or the often-imitated WannaCryptor Ransomware, it does carry a payload with a similar style of attacks that may damage your files to sell a customized restoration service. Malware analysts can verify this Trojan's payload as fully working and the threat as being in deployment.

The File Spider Ransomware's installers are circulating from a bad macro that threat actors are inserting in fake documents, with the subject matter targeting readers interested in the Bayer company's Crop Science division. Enabling the macro requires clicking through a prompt to display all content. Once the user gives this consent, the File Spider Ransomware can install and proceed with its attacks.

The File Spider Ransomware consists of several components: an 'enc' executable, a 'dec' executable, and a shortcut to its ransom pop-up. One of the modules handles the file-locking attack, which may block different formats of media, such as documents, by converting them through an AES algorithm. The File Spider Ransomware also may disable some security applications and features in the meantime, such as the Process Explorer, to give itself full access to your files.

The shortcut launches the File Spider Ransomware's second module, which displays an unusually-formatted pop-up window. However, the content is a traditional warning and a recommendation to access the threat actor's TOR site, insert the custom-generated ID string, and pay Bitcoins for the file-unlocking code. Since the File Spider Ransomware's Bitcoin ransom is under 200 USD in value, malware experts rate it as most likely that the File Spider Ransomware isn't campaigning against corporate or government networks.

Staying out of the File Spider Ransomware's New-Spun Trap

The File Spider Ransomware's infection vector, while a popular option among threat actors using similar Trojans, also includes some limitations for installing it. Victims who don't enable macros should remain uninfected regardless of whether or not they read the document. Most anti-malware scanners should, when analyzing these e-mail attachments, be able to detect the bad script before the File Spider Ransomware's installation happens.

Although malware experts have yet to determine whether the File Spider Ransomware's cipher is breakable by third-party software, they recommend keeping backups for alleviating any temporary damage to your PC's locally-saved documents and media. Paying a Bitcoin fee subjects the victim to the risk of expenditures without procuring a real decryption code or may purchase a decryptor that produces bugged and unreadable output. All users without significant cyber-security experience should have an anti-malware product manager uninstalling the File Spider Ransomware and retrieving its files after the fact.

The File Spider Ransomware is enjoying not-insignificant support and organization from its threat actors, so far. Users who don't want to take the risk of seeing '.spider' extensions marking the newfound illegibility of their files should be ready to keep backups.

Loading...