Home Malware Programs Ransomware Mystic Ransomware

Mystic Ransomware

Posted: September 15, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 57
First Seen: September 15, 2017
OS(es) Affected: Windows

The Mystic Ransomware is a file-locking Trojan that blocks content, such as pictures, by encrypting them. While threat actors use these attacks for promoting their premium decryption services, malware experts often find such solutions unreliable and recommend using any free recovery options that are available. Anti-malware applications may block this threat's infection vectors, such as email spamming campaigns, as well as delete the Mystic Ransomware after it compromises your PC.

A not Too Mystical Attempt to Take over Your File System

The Crypt888 Ransomware family, seen active throughout spring and summer of 2017, is not nearly as active as more widely-abused Trojan resources like Hidden Tear or the Globe Ransomware. However, it does see periodic new members, such as the Zuahahhah Ransomware, the GrodexCrypt Ransomware, and the latest variant, the Mystic Ransomware. While some details of its payload imply that the author has yet to finish developing it, the Mystic Ransomware can leverage full data-encrypting attacks, along with a more limited, backdoor connection.

The Mystic Ransomware's author is configuring the Trojan to target any files on the user's desktop, although future modifications could attack other locations, such as the Downloads or Documents folders. The Mystic Ransomware encrypts media by formats such as PNG and JPG, to block other programs from opening it. Unlike most file-locking Trojans, malware experts can find no associated renaming or name-editing feature with the Mystic Ransomware's encryption attack, meaning that the victim may have issues identifying all of the files that the Trojan is locking.

However, the Mystic Ransomware does provide a list of all blocked media in its Notepad-formatted ransom message, which it generates on the desktop. The note offers five days to pay just over one Bitcoin (280 USD) to purchase a supposedly automated decryption process for unlocking your files.

The Mystic Ransomware also initiates a RASMAN-based remote connection that it uses to communicate with an advertising tracking server currently. Future iterations could modify the feature for letting the threat actor gain control over the PC, although malware experts note that many, similar threats only use such functions for uploading ransoming transaction information, along with the decryption code.

Dispelling a Simple Encryption Attack's Air of Mysticism

Decryption software is available for the Crypt888 Ransomware family for free. Victims may test the compatibility of copies of their blocked media with this software or contact experienced cyber security researchers for any additional assistance needed as a substitute for paying the threat actor's ransom fee. Backing up any important work or media regularly also can give PC users recovery choices that don't need a decryption key that isn't available with every file-locking Trojan whose attacks are similar to those of the Mystic Ransomware.

The Mystic Ransomware is a Windows program with distribution methods estimated as exploiting spam emails. These spammed messages may disguise themselves as workplace notifications or communications from businesses such as a package delivery service. While most anti-malware products should block and remove the Mystic Ransomware by default, malware experts do note that the Trojan often is flagged as a backdoor Trojan incorrectly, due to its network connectivity feature.

Although the Mystic Ransomware is a half-developed Trojan, its embryonic payload is already fully encryption-capable. Any media worth paying ransoms to save are also worth expending a little time to back up to somewhere safe, such as a cloud service.

Related Posts

Loading...