Home Malware Programs Ransomware UIWIX Ransomware

UIWIX Ransomware

Posted: May 11, 2017

Threat Metric

Ranking: 14,984
Threat Level: 8/10
Infected PCs: 581
First Seen: May 11, 2017
Last Seen: September 20, 2023
OS(es) Affected: Windows

The UIWIX Ransomware is a Trojan that tries to block your files by encoding them with a potentially unbreakable cipher, which it exploits for delivering ransom demands. However, the administrators of file-encrypting Trojan campaigns don't always give up their purchased decryption service, and malware experts advise backing up your files for protecting your media. Otherwise, various anti-malware products may delete the UIWIX Ransomware during its introduction to your system.

A Ransom with a Foundation in Web Design

One can determine something of the experience and professionalism of a set of threat actors by some of the supporting elements in their attack campaigns. For deploying file-encrypting Trojans, in particular, how they demand a ransom often is key to identifying the threat and, ideally, even repairing any damaged files. The inclusion of a custom website is a common factor malware experts are seeing more regularly in the past months, such as evidenced by the newly-identified the UIWIX Ransomware.

While other sources are reporting of the UIWIX Ransomware's using AES for attacking the files of any victims, malware analysts have yet to verify this or determine if the Trojan has relationships with preexisting families. It does launch encryption attacks that are capable of blocking files of certain formats or in certain locations, such as text documents or the contents of the desktop. No symptoms of the attack are visible until afterward when the UIWIX Ransomware drops its ransom message necessarily.

The UIWIX Ransomware delivers its ransom demands via Notepad text, which contains limited information in English, besides the user's custom ID and several links to its TOR-anonymous website. The site provides a login form with details on transferring 200 USD in Bitcoins to the threat actor's wallet. Theoretically, once the payment processes, the victim can click another button in the panel to decrypt their files. Malware experts also note that the cash amount and Bitcoin wallet address both appear to be adjustable, which is one of the several indicators that the UIWIX Ransomware could be part of a RaaS campaign.

Keeping Your Files Anonymous from Hiding Extortionists

It's no accident that the UIWIX Ransomware uses both Bitcoins and the modern descendant of the Onion Router for processing any ransoms it might provoke; fraudsters using such measures can protect their identities and infrastructure from many forms of regulatory backlash or penalization. For the victim who pays, the UIWIX Ransomware could take their money and not give them a decryptor necessarily. Preventing file-encrypting Trojans of all types from damaging your data is most directly possible through backing up copies of your media to another drive or server.

Although the Trojan shows all appearances of being fully operational, malware experts can't corroborate any attacks using the UIWIX Ransomware in a live environment. It may compromise your PC through e-mail attachments or other methods, such as browser-based Flash updates of threats like the ThunderCrypt Ransomware. Web surfers should mind their browsers' security settings and use anti-malware products for removing the UIWIX Ransomware as soon as another threat tries to install it.

The simplicity and limited information of the UIWIX Ransomware's interface may be either laziness or an intentional strategy from its threat actors. Whichever it might be, you should try every other recourse before paying the con artist who locked your files to give them back to you.

Loading...