Home Malware Programs Ransomware '.UCRYPT File Extension' Ransomware

'.UCRYPT File Extension' Ransomware

Posted: November 11, 2016

Threat Metric

Threat Level: 2/10
Infected PCs: 5
First Seen: November 11, 2016
Last Seen: July 5, 2022
OS(es) Affected: Windows

The '.UCRYPT File Extension' Ransomware is a variant of the Globe Ransomware, a family of Trojans using encryption for extorting money from PC owners after blocking their files. Besides a new extension, the '.UCRYPT File Extension' Ransomware includes most of the symptoms and security risks of previous versions of that threat. Malware experts suggest that you backup data that you don't wish to risk paying ransoms for recovering and use anti-malware programs for removing the '.UCRYPT File Extension' Ransomware from your computer.

Another Expansion of a Worldwide Globe of Ransoms

Efficiency and minimum-effort-for-maximum-reward are keystones of many threat campaigns, not just in coding, but in deployment and profit generation. One way in which threat developers reduce the risks of their misdeeds and pass much of the work off simultaneously is the RaaS or ransomware-as-a-service model of business. This method of deployment relies on other con artists paying for the privilege of using a Trojan, such as the Crysis Ransomware or the Globe Ransomware. Their configuration choices also can create new variants, such as the '.UCRYPT File Extension' Ransomware.

The 'UCRYPT File Extension' Ransomware is one of several emerging Trojans basing itself on the Globe Ransomware's platform and uses the same encryption and ransoming template. While malware experts have yet to confirm its installation exploits, threat actors have relied on unsafe RDP settings and e-mail for gaining system access previously. A successful launch of the 'UCRYPT File Extension' Ransomware in a Windows environment runs a payload that scans for files (such as DOC and JPG formats) on the local and networked drives.

The 'UCRYPT File Extension' Ransomware encrypts the data through Blowfish, an algorithm used by the Globe Ransomware releases predominantly. Victims can expedite identifying the now-blocked content by looking for the '.UCRYPT' tag that UCRYPT File Extension' Ransomware places after the native extensions. All of the affected content is unusable without being decoded again or overwritten from a backup that the 'UCRYPT File Extension' Ransomware doesn't delete.

Malware researchers warn that readers shouldn't assume that the Windows Shadow Copies are safe from the 'UCRYPT File Extension' Ransomware, which can erase them, along with other system rollback data.

Sending the Old Globe Spinning Off Your PC

The 'UCRYPT File Extension' Ransomware generates revenue for the people administering it by 'selling' decryption help through its HTA pop-up, using a format common to most forms of the Globe Ransomware. Since the 'UCRYPT File Extension' Ransomware's family is highly susceptible to standardized decryption efforts, malware experts advise seeking assistance from PC security researchers for recovering your data. At least one decryptor already released publicly has had notable success rates for reversing the 'UCRYPT File Extension' Ransomware's file damage.

Like the 'Orgasm@india.com' Ransomware, the '.GSupport3 File Extension' Ransomware, the '.kyra File Extension' Ransomware and other derivatives of the same source, the 'UCRYPT File Extension' Ransomware also is weak against thorough backup strategizing. Copies left on servers or devices not vulnerable to the 'UCRYPT File Extension' Ransomware's scans can keep any decryption impediments from turning into long-term damage. Competent anti-malware products also can detect and remove the 'UCRYPT File Extension' Ransomware before its encryption scan can begin.

A Trojan launching an old, well-known type of attack isn't any less harmful to your PC than one using a brand-new, unpredictable payload. Having actively-updated PC security is every bit as necessary to your files' safety as new versions of the Globe Ransomware are to profit-seeking threat actors.

Loading...