Home Malware Programs Ransomware Shark01@msgden.com Ransomware

Shark01@msgden.com Ransomware

Posted: September 25, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 62
First Seen: August 16, 2016
OS(es) Affected: Windows

The Shark Ransomware (also identified as the Shark01@msgden.com Ransomware and the 'Shark CryptoMix Ransomware') is an update of the CryptMix Ransomware family. Although this Trojan uses a different set of encryption keys to protect its attacks from reverse-engineering attempts, it continues using the threat group's traditional strategy of locking files and asking the user to pay to unlock them. Keeping backups, avoiding traditional infection risks like email attachments, and having anti-malware products for deleting the Shark Ransomware proactively can protect your files from an attack.

Predators Swimming Towards Digital Prey

The CryptMix Ransomware family, a collection of Trojans notable for their regular releases and patches, is adding another member in the second half of September. The Shark Ransomware, the new threat in question, doesn't alter the majority of the business model, which encrypts data, like documents, for giving itself leverage with which to ask for ransoms. However, malware experts did detect some minor changes to its encryption feature, which causes any previously-working decryptors to become outdated with this latest build.

Th Shark01@msgden.com Ransomware can compromise a PC after the threat actors target it with brute-forcing strategies manually after the user opens infected email attachments, or after the user's browser suffers exposure to a corrupted website. After the initial contact, the Shark Ransomware doesn't require an Internet connection to complete its main attack: an AES encryption feature that locks different formats of media, such as Word documents, Excel spreadsheets or Adobe PDF documents. The threat actors also gave the Shark01@msgden.com Ransomware a new set of RSA keys to keep free decryption tools from decoding its attack and unlocking these files.

This Trojan adds a new extension ('.SHARK') to the names of any files that it enciphers. It also creates a ransom message in a text file, which is a copy of past versions of the CryptMix Ransomware that malware experts have examined. The instructions offer a custom-generated ID and new email addresses to contact for the victim's negotiations, but paying may or may not be effective at delivering a legitimate decryption program.

Clearing the Water of a Cloud of Extortion

The Shark01@msgden.com Ransomware can terminate various features and programs that could block its attacks, such as the Windows Defender. The Shark Ransomware also generates commands for wiping local, Shadow Copy-based backups and suppressing boot-up errors that the user might associate with the Trojan's installation. Although all of these features are defaults for any member of the CryptMix Ransomware family, they are highly effective at eliminating any symptoms of an infection and depriving any victims of secondary recovery options. Remote backups, still, are the most reliable way of keeping the Shark Ransomware from damaging any files permanently.

Since the Shark01@msgden.com Ransomware can operate without needing an Internet connection, users should be careful of spreading this threat to normally-secure systems. The Shark Ransomware has no worm-based features for copying itself to removable devices, but threat actors may install it on other PCs over a local network manually or use alternative means of distributing it. Businesses with high volumes of financially-valuable digital content and limited security protocols are preferred targets for Trojan campaigns of this type and should use dedicated anti-malware programs for deleting the Shark Ransomware before it can cause any additional harm to a compromised PC.

Like the Empty Ransomware, the Zayka Ransomware, and others before it, the Shark Ransomware is an aggressive showing of threat actors' work ethics in play. With the latest models at the forefront of digital extortion campaigns, unplugging your Internet connection no longer is enough to stop the attacks of Trojans like the Shark Ransomware.
vv

Loading...