Home Malware Programs Ransomware Krypte Ransomware

Krypte Ransomware

Posted: September 29, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 20
First Seen: September 29, 2016
OS(es) Affected: Windows

The Krypte Ransomware is a variant of the Razy Ransomware, a Trojan that encrypts your content and loads a note ransoming their decryptor (despite it not saving the pertinent decryption information). PC owners can mitigate the data loss of the Krypte Ransomware infections by keeping regular backups elsewhere. Anti-malware tools also should be able to detect and delete the Krypte Ransomware, or Trojan installers circulating through common compromise techniques such as e-mail attachments.

A New Offshoot of Coding Education Gone Wrong

Ironically, many file encryption-based Trojans owe their origins to the same kinds of security research and coding resources that the PC security sector uses for developing decryptors and anti-malware updates. The Razy Ransomware is one of a few Trojans derived from public sources to not show any signs of having variants or offspring until the recent appearance of the Krypte Ransomware. Malware experts found this new Trojan in a campaign targeting German speakers through infection methods yet unknown.

The Krypte Ransomware still uses most of the features one also sees in the Razy Ransomware, including the AES data encryption, renaming files, and displaying interactive HTML windows. Identifying the ciphered content can be done by looking for the Krypte Ransomware's renaming pattern, which uses an eight-character random string followed by a '.Fear' extension. The Trojan overwrites the original name in its entirety.

The HTML window delivers a standard ransom message to German speakers and recommends PaySafeCard payments for buying a link to a decryptor. Since the Krypte Ransomware's close ancestor, the Razy Ransomware, did not save the required decryption key, paying the Krypte Ransomware's authors is similarly likely to fail at providing any data recovery.

Like the Razy Ransomware, the Krypte Ransomware emphasizes encrypting content in specific locations and may ignore your secondary drives.

Cutting Off a Young Branch of Threatening Software

The Krypte Ransomware's campaign is regionally limiting itself to Germany and nearby regions but displays attack features that are clear, and present threats to any PC user who manages valuable data. Based on previous patterns of infection by similar Trojans, malware experts recommend looking for compromise attempts through brute-force attempts against weak network passwords, as well as threat installers delivering themselves in e-mail content. As long as you're executing content from a potentially unsafe source, never take it for granted that a file is in the same format that its extension or icon implies.

Even in Trojans with better histories for honoring ransom transfers than a relative of the Razy Ransomware, paying an extortion agreement has a high probability of not putting the victim into closer to decrypting their information. Backing up your files, especially ones of commonly attacked formats (such as DOC, PDF, MP3, and JPG), can help you recover from a Krypte Ransomware infection without taking the risk of paying. A small number of anti-malware products also show good detection rates uninstalling the Krypte Ransomware before its payload finishes.

Whatever your nation of residence is, the frequency of campaigns like the Krypte Ransomware makes it clear that there are no national borders restricting threat attacks or digital ransom attempts.

Related Posts

Loading...