Krypte Ransomware
Posted: September 29, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 20 |
First Seen: | September 29, 2016 |
---|---|
OS(es) Affected: | Windows |
The Krypte Ransomware is a variant of the Razy Ransomware, a Trojan that encrypts your content and loads a note ransoming their decryptor (despite it not saving the pertinent decryption information). PC owners can mitigate the data loss of the Krypte Ransomware infections by keeping regular backups elsewhere. Anti-malware tools also should be able to detect and delete the Krypte Ransomware, or Trojan installers circulating through common compromise techniques such as e-mail attachments.
A New Offshoot of Coding Education Gone Wrong
Ironically, many file encryption-based Trojans owe their origins to the same kinds of security research and coding resources that the PC security sector uses for developing decryptors and anti-malware updates. The Razy Ransomware is one of a few Trojans derived from public sources to not show any signs of having variants or offspring until the recent appearance of the Krypte Ransomware. Malware experts found this new Trojan in a campaign targeting German speakers through infection methods yet unknown.
The Krypte Ransomware still uses most of the features one also sees in the Razy Ransomware, including the AES data encryption, renaming files, and displaying interactive HTML windows. Identifying the ciphered content can be done by looking for the Krypte Ransomware's renaming pattern, which uses an eight-character random string followed by a '.Fear' extension. The Trojan overwrites the original name in its entirety.
The HTML window delivers a standard ransom message to German speakers and recommends PaySafeCard payments for buying a link to a decryptor. Since the Krypte Ransomware's close ancestor, the Razy Ransomware, did not save the required decryption key, paying the Krypte Ransomware's authors is similarly likely to fail at providing any data recovery.
Like the Razy Ransomware, the Krypte Ransomware emphasizes encrypting content in specific locations and may ignore your secondary drives.
Cutting Off a Young Branch of Threatening Software
The Krypte Ransomware's campaign is regionally limiting itself to Germany and nearby regions but displays attack features that are clear, and present threats to any PC user who manages valuable data. Based on previous patterns of infection by similar Trojans, malware experts recommend looking for compromise attempts through brute-force attempts against weak network passwords, as well as threat installers delivering themselves in e-mail content. As long as you're executing content from a potentially unsafe source, never take it for granted that a file is in the same format that its extension or icon implies.
Even in Trojans with better histories for honoring ransom transfers than a relative of the Razy Ransomware, paying an extortion agreement has a high probability of not putting the victim into closer to decrypting their information. Backing up your files, especially ones of commonly attacked formats (such as DOC, PDF, MP3, and JPG), can help you recover from a Krypte Ransomware infection without taking the risk of paying. A small number of anti-malware products also show good detection rates uninstalling the Krypte Ransomware before its payload finishes.
Whatever your nation of residence is, the frequency of campaigns like the Krypte Ransomware makes it clear that there are no national borders restricting threat attacks or digital ransom attempts.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.