Home Malware Programs Ransomware '.icp File Extension' Ransomware

'.icp File Extension' Ransomware

Posted: March 6, 2019

The '.icp File Extension' Ransomware is a file-locking Trojan and a possible variant of the '.snatch File Extension' Ransomware. The '.icp File Extension' Ransomware may block your files, including pictures, documents, or music, by encrypting them and deliver ransoming demands afterward. Use your anti-malware programs for uninstalling the '.icp File Extension' Ransomware and have backups as a way of avoiding needing decryption.

A Filename Extension You Shouldn't Be Glad of Seeing

What could be a new member of the '.snatch File Extension' Ransomware family is attacking Windows users, although malware experts are hesitant of confirming a relationship with its other variants, like the '.Jupstb File Extension' Ransomware and the '.cekisan File Extension' Ransomware. The file-locking Trojan uses encryption for holding media files hostage until it can extract a ransom from the victim. As of early March, only German victims are appearing.

The '.icp File Extension' Ransomware encrypts JPG pictures along with other formats of media, ranging from documents and archives to music or movies, and gives them 'icp' extension tags for letting the victim identify the none-opening content. When it completes the encryption, it drops a Notepad file that contains an updated note from the '.snatch File Extension' Ransomware's family, although the filename isn't the same ('Restore_ICPICP_Files' instead of 'Readme_Restore_Files'). The '.icp File Extension' Ransomware continues giving out an e-mail address for negotiations over a withheld price, although the users take the danger of paying without getting a decryptor.

Germany is the only nation that malware researchers verify as being within the '.icp File Extension' Ransomware's distribution scope, but file-locking Trojans, usually, don't include features that aren't broadly-applicable. Windows users should be protecting their files by backing them up on other devices when it's possible – while OS X ones might remember that the family's originator, the '.snatch File Extension' Ransomware, targets Macs.

Preventing German Trojans from Harvesting Worldwide Ransoms

The '.icp File Extension' Ransomware's payload is no more specific to German residents than the rest of its apparent family's and uses English for its negotiating purposes. The users can undertake several defenses procedures that are applicable against the installation scams and attacks that are representative of the file-locker Trojans' industry. These steps include:

  • Not using account-shared passwords, or ones with short and non-complex character strings will reduce the chances of criminals brute-forcing your logins and compromising the system.
  • Being careful around e-mail messages with links or attachments will rule out many attacks that use fake invoices, articles, and similar tactics for delivering Trojan droppers or downloaders for installing other threats.
  • Safe browsing habits, including avoiding illicit download resources and disabling low-security features like Flash will help with preventing domain-launched attacks (like those of the JCry Ransomware and the OPJerusalum campaign).

Many anti-malware products have excellent rates for detecting these threats and should delete the '.icp File Extension' Ransomware without requiring any user intervention. However, they can't unlock or repair any files directly.

Why the '.icp File Extension' Ransomware deviates from some of the standards of similar threats while maintaining other characteristics is not, yet, knowable. What any PC users can know for certain is that it's not a good time to be without a backup any more than it was yesterday.

Loading...