Home Malware Programs Ransomware HildaCrypt Ransomware

HildaCrypt Ransomware

Posted: October 10, 2019

The HildaCrypt Ransomware is a file-locking Trojan developed for educational purposes. While its live distribution is unintentional, various versions of it are in circulation, and the program is capable of blocking your files. Let your anti-malware products delete the HildaCrypt Ransomware when they find it, and store your backups securely for keeping its encryption from harming your media.

When Educational Programming Goes Awry

While the HildaCrypt Ransomware isn't the first 'for educational purposes' Trojan to find itself misused (Hidden Tear being a famous example of this phenomenon particularly), it could be one of the few to contribute to a Ransomware-as-a-Service accidentally. The Mike RansomwareSTOP Ransomware ransom note. As the technical origin of its capabilities, the HildaCrypt Ransomware offers similar dangers, whether intentionally or not.

The versions of the HildaCrypt Ransomware that malware experts can confirm so far are two. One of them creates TXT ransom notes (not using th4 STOP Ransomware structure, significantly), hides its memory process as a Microsoft PDF Document, and appends 'HILDA!' extensions to the files that it locks. The second variant drops an HTML page with less information than the TXT, appends 'HCY!' extensions, and has its process mimic the setup for XAMPP, an Apache distribution. Both versions include traditional encryption attacks for locking the user's media.

The HildaCrypt Ransomware's authors provided keys that are critical to the decryption process and can 'unlock' files. Users without an appropriate backup can test the compatibility of their work with a free HildaCrypt Ransomware decryptor available online. Despite this easy-to-use solution, malware experts don't recommend going without secure backups for an extended period since most Trojans with file-locking payloads are crack-proof.

Getting the Right Education about Protection from Extortion

Locking files for extortion is a crime that can occur to server owners, enterprise-grade businesses, governments, and random individual users equally. The disguises of the HildaCrypt Ransomware's current variants in the wild lend themselves to two infection vectors:

  • Corrupted PDF documents can spread through e-mail phishing attacks or obfuscated links on social networks. They could download the HildaCrypt Ransomware and other threats through embedded vulnerabilities that you can close off with the appropriate security patches.
  • Although XAMPP is free at its website, unofficial sources, such as torrents, can circulate harmfully-modified or fake installers. Web surfers should be careful while interacting with torrents and file-sharing sites with weak security histories particularly.

Readers also should remember that freeware unlockers and leaks in encryption databases aren't permanent solutions. For example, the STOP Ransomware's family recovered from a similar issue and is one of the most prominent RaaS businesses of 2019. Paying attention to backup practices and not saving all your media to a vulnerable location is an invaluable defense against encryption-using Trojans. As a last line of defense, however, most anti-malware programs should find and remove the HildaCrypt Ransomware from Windows machines adequately.

While the HildaCrypt Ransomware's code leaking is a tragedy, the PC security industry and ordinary PC users have to clean up the consequences of it. Instead of a mop, however, the best tools on hand are rigorous backups, well-maintained browser security and a good anti-malware program.

Loading...