LightningCrypt Ransomware
Posted: May 26, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 40 |
First Seen: | May 26, 2017 |
---|---|
OS(es) Affected: | Windows |
The LightningCrypt Ransomware is a Trojan that locks your files to keep you from using them until you pay its ransom. This Trojan may arrive in various disguises, although current samples pretend to be parts of the Windows OS. Besides using anti-malware programs for removing the LightningCrypt Ransomware as soon as possible, you can protect your computer by backing up its files to places that this Trojan can't attack.
Lightning Striking for a Fraction of a Bitcoin
Keeping their victims from making correct decisions about data recovery is often central to any file-encrypting attack. A PC user who finds alternate means of unlocking or restoring their files will not need to pay any ransom that the Trojan demands, making the infection useless to most threat actors. Threat authors are using different types of manipulation to keep this from coming to pass, as one might see with the ransom notes of the LightningCrypt Ransomware campaign.
The LightningCrypt Ransomware is an independent threat that has no definitive relationship with Trojans like Hidden Tear, EDA2 or the Globe Ransomware. It makes network contact with a Command & Control server, with the expectation of notifying an administrator about the infection, and, potentially, uploading additional system or encryption data. More significantly, for the PC users, the LightningCrypt Ransomware uses a data-encrypting algorithm to lock their files, which can include documents, pictures, and other, prominent formats of media.
The Trojan adds its '.LIGHTNING' extension at the end of every filename without removing the first extension (as an example: 'background.bmp.LIGHTNING') and finishes its payload with delivering two text messages. One file contains the infection's custom ID and the other relays instructions on paying the threat actor's ransom for unlocking your data. Threat actors also are including warnings that any attempts to do any other actions for disinfecting your PC will cause them to delete your files, although malware experts see no evidence that the LightningCrypt Ransomware includes a backdoor feature.
Taking Shelter from a Programmed Storm of Greed
Even if it can't take further action to delete any already-locked content, attacks by the LightningCrypt Ransomware are threats to your hard drive and all data that you store on it. Making backups that you store elsewhere is a more reliable strategy for recovering encrypted content than paying the equivalent of over four hundred US dollars in Bitcoins, which the LightningCrypt Ransomware requests to avoid any refunds. However, victims also can look for assistance from the PC security industry for determining if the LightningCrypt Ransomware is potentially vulnerable to free decryption.
Threats like the LightningCrypt Ransomware are most well-known for distributing themselves through browser-based attacks, like the RIG Exploit Kit, as well as spam e-mails. Macro, Flash and JavaScript exploits often are vulnerable to such abuses, and vulnerable PC users should consider disabling them, as a default state. Some anti-malware programs also are identifying and removing the LightningCrypt Ransomware heuristically.
Just as someone without an umbrella may have to cope with the drenching of a rainstorm, computers without backups or security software may have to deal with data loss from Trojans like the LightningCrypt Ransomware. Fortunately, preventative security steps for crippling this campaign aren't harder than putting on a raincoat significantly.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:file.exe
File name: file.exeSize: 537.6 KB (537600 bytes)
MD5: bdaba38edf29e30fe82f0c2e46ceef07
Detection count: 84
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 26, 2017
file.exe
File name: file.exeSize: 537.6 KB (537600 bytes)
MD5: 899ee6a836d91c9954b4d84a6c905b3a
Detection count: 78
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 29, 2017
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.