Home Malware Programs Ransomware Hollycrypt Ransomware

Hollycrypt Ransomware

Posted: November 7, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 5
First Seen: November 7, 2016
OS(es) Affected: Windows

The Hollycrypt Ransomware is a file-encryption Trojan: a threat that encodes your files to block you from using them. Its attacks include generating extortionist messages offering help with decrypting your media, although malware experts always advise taking other recovery options when they're available. If your anti-malware software is updated regularly, it should detect and delete the Hollycrypt Ransomware before any encryption occurs.

A Trojan with a Taste for Drink

With programming continuing to be a life skill that requires long-term dedication and a certain amount of natural inclination, threat actors often look for ways to avoid the 'hard work' of coding their threats. Readers can see evidence of such activity with many of the samples malware experts identify based off of prior families and code projects, including the different versions of Hidden Tear. The Hollycrypt Ransomware is one of the newest Hidden Tear-based Trojans, with a payload remaining oriented towards blocking data for the sake of extorting money.

The Hollycrypt Ransomware uses what most likely remains the same AES-based algorithm for encrypting your hard drive's media, such as documents while avoiding components required by the Windows OS. The Trojan appends a '.Hollycrypt' extension to the end of their names, helping you detect which files it's blocking.

The Hollycrypt Ransomware's other function of any significance is its ransoming message generator, which creates Notepad files (with the name 'Read_this_shit.txt') on your desktop. The instructions ask for 'some bitcoins or vodka' for assisting with your data recovery and include no additional details besides the threat actor's e-mail address. Although the unprofessional tone of the extortion message, and the author's use of a public e-mail account, makes the Hollycrypt Ransomware the likely work of an amateur, the Trojan retains all of the file-encrypting capabilities of any Hidden Tear program.

The Hollycrypt Ransomware Antidote that will not Cost a Thing

One of the dangers of encryption as a technology is its capacity for abuse by con artists who have no significant programming experience. Even though the PC security sector has developed decryption utilities intended for restoring data subjected to Hidden Tear-based ciphering, decryption isn't always a practical possibility. Giving reputable security researchers samples of the Hollycrypt Ransomware, along with copies of non-encrypted and encrypted files, may help speed the development of decryptor updates against this Trojan and others like it.

When decryption is unavailable, data restoration still may be possible for PC owners protecting their content with backups. Many threats of this classification will erase Windows restore points and shadow volume copies, but fewer will target your cloud storage or peripherals. Outside of any recovery options you consider appropriate, always use a designated anti-malware product to uninstall the Hollycrypt Ransomware and stop any further attacks.

As a source of code available to the general public, Hidden Tear, clearly, is going nowhere, which means that Trojans like the Hollycrypt Ransomware are also likely to retain indefinite positions as part of the harmful software industry.

Loading...