Home Malware Programs Ransomware 'Systemdown@india.com' Ransomware

'Systemdown@india.com' Ransomware

Posted: August 24, 2016

Threat Metric

Threat Level: 10/10
Infected PCs: 5
First Seen: August 24, 2016
OS(es) Affected: Windows


The 'Systemdown@india.com' Ransomware is a variant of the Crysis Ransomware that locks your files with encryption attacks and loads messages asking for ransoms for their safe decryption. Con artists may not feel obligated to provide any services after taking their ransom money, and malware analysts recommend keeping backups to protect yourself against such incidents. Besides whatever choices you make in dealing with the hostage scenario, use your anti-malware products to remove the 'Systemdown@india.com' Ransomware and prevent it from continuing its attacks.

Taking Your System Down to Encryption Town

PC owners wanting to protect their PCs from threatening software now may be troubled by having insufficient time to track most new threats. Increasingly, threat authors are showing signs of preferring renting their software products to other remote attackers, who choose to configure custom variants of Trojans, such as the 'Systemdown@india.com' Ransomware. This Trojan most likely is based on the same code as the Crysis Ransomware, but, no matter what its origins may be, it can cause permanent losses of file data.

Although the 'Systemdown@india.com' Ransomware doesn't attack data related to the infected system's OS, it does target texts and other media, such as Word DOC documents or Excel's XLS spreadsheets. Besides inserting ID numbers, its e-mail contact and the '.xtbl' extension into each file's name, the 'Systemdown@india.com' Ransomware also leverages an encryption attack via AES and RSA algorithms. The attack stops the PC's owner from accessing any of his data, similarly to the campaigns of the 'Okean-1955@india.com' Ransomware, the 'Meldonii@india.com' Ransomware or the 'Payfornature@india.com' Ransomware.

Victims can expect visible symptoms in the form of ransom messages delivered through desktop wallpapers or Notepad TXT files. Under no circumstances can malware analysts recommend paying any fee to con artists whenever you haven't tested all alternative recovery methods.

Rising Over Simple Encryption Attacks

The 'Systemdown@india.com' Ransomware is not regional to India and seems to target English-speaking companies predominantly. Infection vectors could include e-mail content or, in less frequent cases, brute force attacks against easy remote desktop access or simple network passwords. PC owners should strive to protect their systems from the 'Systemdown@india.com' Ransomware before its attacks can conclude and hold their data hostage, both by avoiding the above infection methods and scanning all incoming content for threats.

The PC sector security has had limited success with decrypting the 'Systemdown@india.com' Ransomware and other variants of the Crysis Ransomware. Keep a backup on a password-protected server or a detached drive and update it regularly, which will give you a resource to overwrite any encrypted data. Due to the possibility of encryption attacks triggering repeatedly, malware experts do warn that you should remove the 'Systemdown@india.com' Ransomware through proper anti-malware solutions before introducing any new files to the system.

There is little new about the 'Systemdown@india.com' Ransomware to strike a sharp difference from other builds of this family. However, its use of reliable, proven technology does emphasize how PC owners will need to continue paying attention to all established security weaknesses favored by similar Trojan campaigns.

Loading...