Home Malware Programs Ransomware PyL33T Ransomware

PyL33T Ransomware

Posted: February 23, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 49
First Seen: February 23, 2017
Last Seen: June 25, 2021
OS(es) Affected: Windows

The PyL33T Ransomware is a Trojan that can lock your files by enciphering them with an AES algorithm, after which it displays a pop-up notification that delivers its ransom demands. Recovering your data with a decryption application may be impossible, and concerned PC users should continue protecting their media by backing it up to secure locations. Malware experts also strongly recommend updating any anti-malware products, when appropriate, to heighten the chances of detecting and removing the PyL33T Ransomware upon exposure.

A Snake Grows a New Head for Ransoming What's Yours

Python is a lesser-used programming language but is broadly capable of achieving similar results as that of more conventional alternatives, like C++. Malware experts can maintain this truism equally well for threatening software like file-encrypting Trojans, which readers can observe in action through such threats as the e-mail account targeting the Zimbra Ransomware or the recent PyL33T Ransomware. For its part, the PyL33T Ransomware most likely is an original program and shows no connections to past families of similarly extortion-oriented Trojans.

The PyL33T Ransomware is an in-development program that uses port '1337' for its Command & Control server communications, providing it with its current name. It identifies the files to attack by searching for specified drives and extensions, such as TXT, JPG, SQL and PDF. Any files matching its requirements undergo an AES-based encryption to block them from opening. Like many Trojans, the PyL33T Ransomware also adds a new '.d4nk' file name extension for both identification and branding purposes. Then, the Trojan uses the Windows MessageBox function to deliver any ransom-related information to the victim.

Cutting Back on Serpentine Problems in Your Life

With malware experts noting multiple versions of the PyL33T Ransomware in a short span of time, this Trojan's development appears to be highly active and is likely of being completed soon. AES-based encryption techniques sometimes can be impossible to decrypt freely, putting victims in the position of risking paying con artists for their help or losing their content entirely. However, the PyL33T Ransomware includes no features for targeting secure backups on cloud servers or removable devices, which continues giving weight to them as safe recovery options.

The PyL33T Ransomware is a Windows-specific application compatible with 32 and 64-bit environments. Since its installation exploits still are being appraised, PC users can only protect their files by scanning any suspicious files with the proper security applications and conducting their Web-browsing with safe settings. E-mail is one of the most widely used infection vectors for new, file-encrypting Trojans, although updated anti-malware products should detect and delete the PyL33T Ransomware when given the opportunity.

The PyL33T Ransomware isn't a particularly high-end Trojan, but even simple threats can cause file damage that's far more troublesome to reverse than it is to implement. Computer owners with personally-valuable media should take steps for protecting that information accordingly.

Loading...