Home Malware Programs Ransomware HC6 Ransomware

HC6 Ransomware

Posted: November 30, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 79
First Seen: March 1, 2022
Last Seen: March 1, 2022
OS(es) Affected: Windows

The HC6 Ransomware is a Python Trojan that locks your files by encoding them with an AES cipher and, then, protecting that encryption method with the SHA-256. This Trojan's threat actor is deploying it against business-based networks so that he can collect a ransom for the decryption solution. While this Trojan isn't secure and is decryptable by other methods, malware experts also suggest having isolated backups and proactive anti-malware programs to keep your files safe and delete the HC6 Ransomware when required.

A File Problem as Big as Your Home Network

The data kind that Trojans choose for their victims often give blueprints of their overall campaign's plan for monetizing their attacks, but not all threatening software is highly discriminating. The HC6 Ransomware represents one of the most 'inclusive' of file-locking threats and may act against numerous types of digital media on multiple PCs after installing itself a single time. For the moment, malware experts are rating business sector networks as being at the most risk through means such as e-mail spam and brute-force attacks.

After compromising a PC that's compatible with the Python software, the HC6 Ransomware searches all folders and directories for nearly three hundred data types that it can 'lock' with encryption. The formats at risk include specialized, workplace-oriented databases, as well as different forms of archives, spreadsheets, sound clips, software-specific backups and movies.

For its encryption purposes, the Trojan uses a simple, AES-256 in CBC mode cipher that it secures with the SHA-256, instead of the more often used AES-RSA combination. It also adds '.fucku' extensions to the names of the disabled content, which is a symptom that the HC6 Ransomware shares with the unrelated Fucku Ransomware (which is a variant of Samas or SamSam Ransomware).

Note that this file-scanning behavior also accesses other PCs that the Trojan is capable of reaching over a local network connection, including both mapped and non-mapped drives. Consequently, one HC6 Ransomware attack can disable the media of an entire network that consists of multiple Windows machines.

Getting Bargains with Trojan File Excavation

Most threat actors include secure enciphering techniques like the RSA algorithms for good reasons: with a weak alternative, like the HC6 Ransomware's AES and SHA-256 combination, third parties are free to break the encryption method with little to no difficulty. Victims who have no unharmed backups for retrieving their files can use free a decryption software already available in the cybersecurity community specific to the HC6 Ransomware. Although the HC6 Ransomware does drop Notepad messages demanding money (in the form of 2500 USD via Bitcoins) for decryption services, informed PC users have no reason to pay this ransom with the Trojan's current build.

Cybercrooks are deploying the HC6 Ransomware against business entities for cryptocurrency profits actively, although malware experts are awaiting additional evidence of the infection strategies in use. Web-browsing exploits sometimes are implemented for attacking targets of this type, but, most often, e-mail attachments or improperly weak network logins are the ultimate causes of a file-locking Trojan's installation. Many anti-malware programs are deleting the HC6 Ransomware accurately and also should identify and block most of the exploits that threat actors could use in its install routine, such as Word macros.

The HC6 Ransomware attacks an outrageously wide range of formats of content, along with not limiting itself to just the one system that it infects. A single misstep in minding your Web-browsing behavior can turn into multiple PCs' worth of file damage; at least, for users who don't back up their work.

Loading...