Home Malware Programs Ransomware NETCrypton Ransomware

NETCrypton Ransomware

Posted: November 29, 2017

Threat Metric

Threat Level: 5/10
Infected PCs: 176
First Seen: March 1, 2022
Last Seen: July 6, 2023
OS(es) Affected: Windows

The NETCrypton Ransomware is a file-locking Trojan that disguises itself as a cracking utility for data recovery software. Current releases of this Trojan provide a prompt that the user may refuse for avoiding its encryption attacks, although future ones may omit this option and lock your files automatically. Have legitimate backup software and standards in place to protect your media from this threat and always let a dedicated anti-malware program delete the NETCrypton Ransomware for the safety of your PC.

Trojan Attacks with the Choice of Opting Out

With the need to balance verifying their attack functions along with the stability of a testing environment, developing threatening software can provide unique challenges for the authors. For file-locking threats, this development stage is often self-limited by having the Trojan attacking only a highly niche location or set of file formats. With the NETCrypton Ransomware, however, the Trojan is providing an unusual, extra 'feature' that may help the victims avoid damaging their PCs: a pop-up that gives them the option to refuse the infection.

The NETCrypton Ransomware's executables are disguising themselves as generators for EaseUS software keys, which is an application for maintaining backups. This disguise is part of more than just the name of the file; malware analysts can confirm that the NETCrypton Ransomware includes a fake user interface that imitates a traditional keygen application with fields for licenses and activation codes. However, before this UI appears, the program gives you an option to 'execute this ransomware' or turn it down, which probably is a safety feature for the Trojan's author.

Users who select 'yes' to the original request and try to use the key generator will, instead, lock the documents, pictures, and other media on their PCs with the NETCrypton Ransomware's encryption feature, which uses a cipher that malware analysts have yet to confirm. The Trojan also creates a stereotypical ransom message through an HTML pop-up, which gives the victim a Bitcoin ransoming demand of 300 USD and a wallet address (but no other information, such as an e-mail address to contact for more help).

Generating a Sense of Safety from File-Lockers

Since the removal of the NETCrypton Ransomware's testing feature could occur at any time with nearly no effort by its threat actor, PC users should avoid presuming that the Trojan always will ask them whether or not they want to run it. Key generators are an extremely traditional disguise for many types of threatening software, including some forms of file-locking threats, and, like all piracy-related applications, should be assumed as being potentially harmful to your computer. Users often encounter these tactics via corrupted websites dedicated to providing fake freeware, as well as decentralized file-sharing networks such as torrents.

Ironically, the NETCrypton Ransomware's tactic also gives any victims a hint on the correct way to reduce its negative security implications. Using backup software and schedules, and securing any additional storage devices, can help with restoring any content that the NETCrypton Ransomware locks (which always should bear the '.encrptd' extension). At least one third-party researcher in the security community also is providing free decryption services for this threat. Preferably, your anti-malware programs should remove the NETCrypton Ransomware before any attacks happen whether or not you agree to its initial request.

Not every Trojan is as considerate as the NETCrypton Ransomware, and even this campaign may soon be fine-tuning the consensual aspects of its payload. Users willing to break the law by downloading and running illicit software have no one other than themselves to blame for being victimized in their turn.

Loading...