Home Malware Programs Ransomware Shifr Ransomware

Shifr Ransomware

Posted: April 25, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 5
First Seen: April 25, 2017
Last Seen: October 18, 2019
OS(es) Affected: Windows

The Shifr Ransomware is a Trojan that locks your files by encrypting them with a cipher such as theAES-128. Having well-maintained backups can reduce the Shifr Ransomware's potential for causing any damage, especially since following any provided instructions may not give you a decryptor. Use qualified anti-malware products to guard against common installation exploits, such as e-mail spam, or remove the Shifr Ransomware from an already compromised system.

The Trojans Shifting Your Files Just Barely out of Use

The people operating Trojan campaigns are maintaining strong preferences for collecting ransoms through methods not subject to being tracked or refunded. While old forms of ransom-based threats often preferred to use services like the now-defunct Ukash, the Shifr Ransomware embodies the modern trends of its black market industry by asking for cryptocurrency-based payments. The Shifr Ransomware forces these ransom transactions after locking the victim's local files, which has the potential to damage the affected content permanently.

Malware analysts only find English-based variants of the Shifr Ransomware, although this choice of language could be purely for compatibility with as many regions of the world as possible. The Trojan uses what's being estimated as an AES-based algorithm to encipher local content currently, such as videos or documents, on Windows machines. Victims may be able to detect this locked media by searching for '.shifr' extensions on the filenames.

The Trojan also is depositing a simple HTML-based ransom note onto the desktops of any compromised PCs. As of April 2017, the Trojan uses these messages to ask for 0.1 Bitcoins (which converts to 127 USD) before the threat actors agree to provide the download link for its decryption application. The failure to include a decryption module embedded in the Shifr Ransomware is significant due to reducing vulnerabilities that could help the anti-malware industry crack this threat's encryption routine and deliver free file-unlocking services. Simultaneously, the threat actors may just take their payment without giving you a legitimate download link.

Paying the Only Acceptable Price for Your Files

The Shifr Ransomware preys on vulnerable PC users who don't backup their media or take other steps to protect their locally-saved content from harm. Like any file-encrypting Trojan to date, keeping copies of your files on another, safe drive, and blocking its installation in the first place most directly weaken the Shifr Ransomware’s payload. Malware analysts also recommend monitoring your RDP settings, rotating network passwords, watching your Web-browsing activities for potential attacks and analyzing all downloads with appropriate security software.

Bitcoin and similar cryptocurrencies are high in preference for profit-minded con artists due to the non-traceable, non-refundable nature of such transactions. Always be aware that paying the Shifr Ransomware's ransom has no built-in guarantee of you getting access to either a decryption key or a program that can decrypt your files for you. High-quality anti-malware programs may delete the Shifr Ransomware either during or after its installation attempt but can't unlock any of the encoded content.

As con artists continue experimenting with different ways of demanding the same payments, victims should keep informing themselves of all the risks of digital extortion. The Shifr Ransomware and other, file-locking Trojans are only dangers to the poorly prepared and protected.

Loading...