Home Malware Programs Ransomware HDD Encrypt Ransomware

HDD Encrypt Ransomware

Posted: September 15, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 67
First Seen: September 15, 2016
OS(es) Affected: Windows


The HDD Encrypt Ransomware, also detected as Mamba, is a Trojan that encrypts your PC's data at the disk level instead of isolating individual files. Because these attacks block you from both your information and your operating system, alternate system boot-up strategies may be mandatory for restoring the affected machine. When prescriptive security steps can't prevent an infection, use your anti-malware products for identifying and deleting the HDD Encrypt Ransomware before it can complete its attacks.

When the First Thing Your PC Boots to is an Extortion Message

The clear majority of file encrypting Trojans to date focus on targeting relatively small numbers of files, most often of specific data types and saved in very particular locations. This technique lets con artists cause the most damage to a victim in the least amount of time (such as by encrypting work documents), while also guaranteeing the rest of the PC's overall stability. However, some threat authors choose a broad-sweeping method of data encryption. Malware experts see this philosophy at work with the Petya Ransomware and, as of August, the HDD Encrypt Ransomware.

Details of the HDD Encrypt Ransomware's infiltration methods are yet to be revealed, although its campaigns seem to generate minor variants of the Trojan for business entities with significant server infrastructure. Information unique to each scenario, such as the victim ID, most likely is hard-coded in the HDD Encrypt Ransomware's ransom message. For now, the files associated with this threat follow a numerical naming pattern, such as '141.exe' or '152.exe.'

Unlike the Petya Ransomware, the HDD Encrypt Ransomware uses a third-party program, DiskCryptor, for encrypting the disk. It also creates a new Windows user account. The next system restart loads the HDD Encrypt Ransomware's ransom message, instead of the Windows OS, which asks you to contact the con artists for a decryption key. The payments currently run at one Bitcoin (six hundred USD) per infected machine.

The Ideal Anti-Venom for a Trojan's Bite

Based on the contents of their associated Bitcoin wallet, the HDD Encrypt Ransomware's authors seem to have been collecting at least five ransom payments, so far. The observable operating methodology and choices of targets in this Trojan's campaign make it likely that corporations are being compromised by brute force attacks or e-mail infection vectors, with its threat actors exploiting any relevant network vulnerabilities for giving the HDD Encrypt Ransomware access to as many servers as possible.

An individual PC's compromise requires booting in a way that bypasses the Master Boot Record modifications made by the HDD Encrypt Ransomware, such as by booting from a removable USB device or DVD. Since no decryption solutions yet exist for the HDD Encrypt Ransomware, besides paying its ransom and hoping its con artists deliver their side of the transaction, there may be no recovery options for any encrypted data.

Network security almost always is at fault for allowing threats like the HDD Encrypt Ransomware to gain a position for damaging a company or individual's files. Keep accounts protected with complex, rotating passwords, and use anti-malware tools for scanning all incoming e-mail attachments to remove the HDD Encrypt Ransomware before it can turn into a problem for the most essential of Windows components.

Loading...