Home Malware Programs Ransomware LightningCrypt Ransomware

LightningCrypt Ransomware

Posted: May 26, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 40
First Seen: May 26, 2017
OS(es) Affected: Windows


The LightningCrypt Ransomware is a Trojan that locks your files to keep you from using them until you pay its ransom. This Trojan may arrive in various disguises, although current samples pretend to be parts of the Windows OS. Besides using anti-malware programs for removing the LightningCrypt Ransomware as soon as possible, you can protect your computer by backing up its files to places that this Trojan can't attack.

Lightning Striking for a Fraction of a Bitcoin

Keeping their victims from making correct decisions about data recovery is often central to any file-encrypting attack. A PC user who finds alternate means of unlocking or restoring their files will not need to pay any ransom that the Trojan demands, making the infection useless to most threat actors. Threat authors are using different types of manipulation to keep this from coming to pass, as one might see with the ransom notes of the LightningCrypt Ransomware campaign.

The LightningCrypt Ransomware is an independent threat that has no definitive relationship with Trojans like Hidden Tear, EDA2 or the Globe Ransomware. It makes network contact with a Command & Control server, with the expectation of notifying an administrator about the infection, and, potentially, uploading additional system or encryption data. More significantly, for the PC users, the LightningCrypt Ransomware uses a data-encrypting algorithm to lock their files, which can include documents, pictures, and other, prominent formats of media.

The Trojan adds its '.LIGHTNING' extension at the end of every filename without removing the first extension (as an example: 'background.bmp.LIGHTNING') and finishes its payload with delivering two text messages. One file contains the infection's custom ID and the other relays instructions on paying the threat actor's ransom for unlocking your data. Threat actors also are including warnings that any attempts to do any other actions for disinfecting your PC will cause them to delete your files, although malware experts see no evidence that the LightningCrypt Ransomware includes a backdoor feature.

Taking Shelter from a Programmed Storm of Greed

Even if it can't take further action to delete any already-locked content, attacks by the LightningCrypt Ransomware are threats to your hard drive and all data that you store on it. Making backups that you store elsewhere is a more reliable strategy for recovering encrypted content than paying the equivalent of over four hundred US dollars in Bitcoins, which the LightningCrypt Ransomware requests to avoid any refunds. However, victims also can look for assistance from the PC security industry for determining if the LightningCrypt Ransomware is potentially vulnerable to free decryption.

Threats like the LightningCrypt Ransomware are most well-known for distributing themselves through browser-based attacks, like the RIG Exploit Kit, as well as spam e-mails. Macro, Flash and JavaScript exploits often are vulnerable to such abuses, and vulnerable PC users should consider disabling them, as a default state. Some anti-malware programs also are identifying and removing the LightningCrypt Ransomware heuristically.

Just as someone without an umbrella may have to cope with the drenching of a rainstorm, computers without backups or security software may have to deal with data loss from Trojans like the LightningCrypt Ransomware. Fortunately, preventative security steps for crippling this campaign aren't harder than putting on a raincoat significantly.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 537.6 KB (537600 bytes)
MD5: bdaba38edf29e30fe82f0c2e46ceef07
Detection count: 84
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 26, 2017
file.exe File name: file.exe
Size: 537.6 KB (537600 bytes)
MD5: 899ee6a836d91c9954b4d84a6c905b3a
Detection count: 78
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 29, 2017
Loading...