Home Malware Programs Ransomware 'seed@firemail.cc' Ransomware

'seed@firemail.cc' Ransomware

Posted: February 20, 2019

The 'seed@firemail.cc' Ransomware or 'Seed Locker' is a file-locker Trojan that blocks your computer's media, such as documents, slideshows, spreadsheets or pictures. The 'seed@firemail.cc' Ransomware adds new extensions into their names for identification and delivers text-based ransoming directions for the threat actor's decryption assistance. The users can back up their work as a secure recovery option or depend on freeware decryption solutions after deleting the 'seed@firemail.cc' Ransomware with their anti-malware product of choice.

Evil Sprouting from a Small Seed

A file-locking Trojan is starting up its attacks against the public while giving few cues about its genealogy or its infection strategies. The 'seed@firemail.cc' Ransomware, while operating on a template that's not dissimilar from that of Hidden Tear or the Scarab Ransomware, is of no known family and even its encryption method is subject to debate. Malware analysts can confirm its payload's targeting media files, one by one, and locking them for forcing the users into paying ransoms.

The 'seed@firemail.cc' Ransomware uses encryption with an unknown algorithm for turning your files into non-opening data that their normal, associated programs can't interpret. Assuming that there are no glitches in this process, the damage is reversible but could require a custom key that may or may not be in the threat actor's possession. Users without other choices for recovering their work, which the 'seed@firemail.cc' Ransomware tags with '.seed' extensions should contact a cyber-security researcher with experience in threats of this classification; the attack may be decryptable with free software.

At this early date in its campaign, malware experts are confirming another symptom: a Notepad ransoming message. This message follows a generic template and delivers ransoming instructions in English with some minor grammar errors. The 'seed@firemail.cc' Ransomware provides, notably, a much shorter ID for its victims than the ones in use by most of the Ransomware-as-a-Service industry, along with the new e-mail addresses that its name references.

Trimming the Growing Problem of Automatic Encryption

As minor an incident as the 'seed@firemail.cc' Ransomware's forcing itself into an already-crowded underground marketplace might be, its campaign could offer new infection risks for the victims and sow confusion regarding the compatible decryption services. The users never should decrypt the only copies of their locked files with an untested program, which may damage the file instead of recovering it. The danger of data corruption is particularly likely if the decryption software is for a different Trojan, such as the Globe Ransomware or the Dharma Ransomware families.

No victims are reporting attacks describing the 'seed@firemail.cc' Ransomware's infection vectors, but malware experts, often, see some techniques more often in use than others. Vulnerabilities relevant to the current year include e-mail attachments and links, brute-force password crackings (most often, against business sector networks), and questionable download resources like torrents. Your anti-malware products should delete the 'seed@firemail.cc' Ransomware before encryption can happen, and the users shouldn't assume that the file-locking attack will cause any symptoms while it's ongoing.

Readers should hope that the 'seed@firemail.cc' Ransomware dies soon after sprouting, but that's entirely up to those who have the choice of paying a ransom or keeping their money to themselves. Data that's worth paying for is, also, worth backing up and otherwise preserving.

Loading...