Home Malware Programs Ransomware FlyBox Ransomware

FlyBox Ransomware

Posted: July 10, 2020

The FlyBox Ransomware is a file-locking Trojan that can encrypt your media files and keep them from opening in their associated programs. The FlyBox Ransomware generates interactive pop-ups for its ransom demands, which ask for Bitcoins in return for an unlocker. However, there are free options for recovery, in addition to traditional backups, and malware experts recommend ignoring the ransom while letting anti-malware services remove the FlyBox Ransomware.

The Nonconsensual File Storage that's Fragile Surprisingly

File-locking Trojans bank as much on bluster as they do on their victims being unprepared for data-based attacks. With the FlyBox Ransomware, which much resembles the Hidden Tear remixes of yore, its payload shows evidence of having more bark than bite. Those who pay into its ransoming 'business model' will lose that money in vain, and wholly unnecessarily.

The FlyBox Ransomware is a Windows program with no known relatives or family relationships, unlike most file-locking Trojans. It has an exceptional file size of over ten megabytes, and uses the Windows .NET Framework, similarly to the Yogynicof Ransomware or the Mike Ransomware. Its behavior includes the traditional aspects of its threat type: encrypting media files like documents, adding 'FlyBox' extensions to them, creating a pop-up alert that sells its unlocker service, and erasing some internet and intranet settings in the Registry.

The FlyBox Ransomware claims that it uses an unbreakable combination of AES-254 and RSA-2048 'military' encryption, a believable assertion. However, malware experts can verify that its locking routine is not secure and should be reverse-engineer-suitable in current builds. Victims that panic over its payment deadline would benefit from remaining calm and entering its static decryption key for recovering their files (currently: 'CA75BA0A6DAC420182E5DAEBF74A09E3').

Keeping Your Files Out of Someone Else's Locker

The FlyBox Ransomware's name could refer to a variety of services and companies, including a 'virtual locker' business in Colombia. Still, no hard affiliation between the Trojan and any legitimate business enterprise is likely. Although the FlyBox Ransomware is weaker to brute-force decryption than most file-locker Trojans, updates to its code quickly may secure its attack from third parties. As such, malware researchers remain in consensus on the need to limit its campaign's opportunities by impeding infection attempts.

The FlyBox Ransomware's executable includes data that implies its pretending that it's a key generator or keygen: a tool that facilitates software piracy by generating 'free' keys for premium games, art suites and other programs. Software piracy, or failed attempts at it, are rife with security risks, and especially are a favorite choice for file-locking Trojans, including not just the FlyBox Ransomware, but even significant families like the STOP Ransomware. Users should always maintain a legal download history and take precautions such as scanning downloads from potentially-threatening sources like torrents.

For those who scan their files with proper anti-malware solutions, current databases should identify the FlyBox Ransomware securely. Updates will improve these rates naturally since this article's publication, and users should depend on professional security software for uninstalling the FlyBox Ransomware, whenever possible.

The FlyBox Ransomware isn't flying anywhere, except to a future without ransoms collected. A Trojan that neglects to secure its encryption should get precisely the same as the work its coder put in: virtually, nothing.

Loading...