Home Malware Programs Ransomware '.powerfulldecrypt File Extension' Ransomware

'.powerfulldecrypt File Extension' Ransomware

Posted: January 18, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 5
First Seen: January 18, 2017
Last Seen: January 20, 2022
OS(es) Affected: Windows

The '.powerfulldecrypt File Extension' Ransomware is a new version of the SamSam Ransomware, a Trojan with a history of locking files on networks within the medical sector. Although the '.powerfulldecrypt File Extension' Ransomware's ransom method uses a website payment process for recovering your data, the encryption attack can occur while the system is offline. Malware experts recommend minding your network security, backing up all content, and blocking the '.powerfulldecrypt File Extension' Ransomware through the same anti-malware solutions effective against the SamSam Ransomware.

All the Power to Encode What's on Your Servers

The SamSam Ransomware or Samas family of Trojans is beginning to grow forks to match those of competing families, possibly as a result of its author renting the Trojan out to third-party extortionists. As always, this new version of the file-encrypting Trojan '.powerfulldecrypt File Extension' Ransomware gains access to the system through non-consensual or disguised methods, such as e-mail, and blocks most accessible file formats by encrypting them. Malware researchers see no changes that would suggest that the '.powerfulldecrypt File Extension' Ransomware is shifting from the AES to a new algorithm, similarly to the transition that the Globe3 Ransomware family is making.

While encrypting your files, the '.powerfulldecrypt File Extension' Ransomware modifies the filenames with new '.powerfulldecrypt' extensions added to each one. The encryption and name-modifying portion of the '.powerfulldecrypt File Extension' Ransomware's payload doesn't require any network connectivity, indicating that the Trojan doesn't preserve a decryption key by uploading it to a C&C server. It finishes by creating an HTML message for the victim to read.

However, the '.powerfulldecrypt File Extension' Ransomware does require online access to make the ransom payment for purchasing its decryption assistance and unlocking your data. It protects the transaction with the Bitcoin cryptocurrency's built-in anonymity features, and also uses a TOR browser address, giving the website's administrator additional protection.

Because the '.powerfulldecrypt File Extension' Ransomware is from a family that targets business networks, its ransom fees may be exceptionally high, with minimums often being well over 100 USD in value. Malware experts also note that associated threat actors may raise their fees, over time.

A Powerful Trojan Mandating a Powerful Solution

Threat actors using Trojans from the '.powerfulldecrypt File Extension' Ransomware's family may take advantage of a flawed network security, such as improper RDP settings or bad passwords. They also may leverage hacking tools unique to JBoss and other software environments pertinent to the medical industry. When they establish the backdoor, threat actors can load the '.powerfulldecrypt File Extension' Ransomware without worrying about disguising the installer or tricking a victim into launching the threat.

The Trojan's encryption payload may impact multiple machines that it accesses over any insecure local networks. Although a business may choose to pay a ransom and hope that the threat actor responds by giving them a real decryption solution, malware researchers may rate such recovery options as being unreliable, at best. Proper backup strategies can eliminate most of the dangers associated with this threat, which lets you delete the '.powerfulldecrypt File Extension' Ransomware and restore any locked files without breaking the encryption.

No word is verifiable on whether the '.powerfulldecrypt File Extension' Ransomware is branching its attacks out to new industries. However, its family's continuing prominence does show that businesses need to worry about the safety of their saved, digital resources just as many as any regular Web surfer.

Loading...