Home Malware Programs Ransomware Vfcfocxp Ransomware

Vfcfocxp Ransomware

Posted: May 28, 2020

The Vfcfocxp Ransomware is a file-locking Trojan that's a part of the Snatch Ransomware family. The threat actor associated with this family may use a password or software-related vulnerability for compromising targets and conduct other attacks, such as collecting information. Users should have remote backups for recovering any files and anti-malware protection for deleting the Vfcfocxp Ransomware.

Smaller, but not Weaker: a Trojan Family's Business Keeps a Brisk Pace

The Snatch Ransomware group is an outlier from most file-locking Trojans that belong to a sizable family. With Go for its programming language and vulnerability-based targeting methods against enterprise entities, it represents a more streamlined form of the data-ransoming business model than the norm. Its threat actors seem to rate it as worth the effort competing against Ransomware-as-a-Services since a new variant is making itself apparent: the Vfcfocxp Ransomware.

The Vfcfocxp Ransomware has few relatives, for now, with the campaigns of the Hceem Ransomware and the Pigzqbqnvbu Ransomware being some of the most chronologically-relevant comparison points. Its family first catapulted into fame after abusing the Windows Safe Mode feature as an anti-security technique while encrypting files. Like the other versions of this family, the Vfcfocxp Ransomware uses this encryption for locking content from opening and targets ransom-worthy media, with a few unusual additions (such as MO files).

The Vfcfocxp Ransomware adds the 'vfcfocxp' string (without capitalizing) onto filenames, after any existing extensions as a second extension. It also creates multiple ransom notes, all of which are identical, in every folder that holds encrypted content. The ransom message is very similar to past versions from this family, although the Snatch team is using a pair of 'throwaway' VFEmail addresses with pseudo-unique domains for communicating.

Taking Your Network Out of a Trojan's Way of Doing Business

Although there is a possibility of forks in the Snatch Ransomware family's going for other operating systems, the Vfcfocxp Ransomware and its known kin all are Windows-based threats. Users should protect their server software from vulnerabilities by installing security patches as soon as they're available. Anti-brute-forcing password choices are also a high priority for preventing attacks from the Vfcfocxp Ransomware's family.

Paying ransoms to Trojan operators may or may not become a source of data recovery, and is provoking an expensive tactic equally likely. All users, in business environments or casual ones, should protect any valuable files with appropriate backup measures. Backups on removable devices and secure cloud servers will keep threat actors from having any value to offer in their decryptor-ransoming schemes. More rarely, the Shadow Volume Copy-based recovery may be available.

Malware researchers also confirm that professional AV vendors are flagging this threat correctly. Users protected by automated anti-malware solutions should remove the Vfcfocxp Ransomware before it can harm any files.

The individualistic parts of the Vfcfocxp Ransomware's heritage only serve as contrast for showing all the more-expected attack techniques that remain viable for the Snatch team. Putting your files at risk with careless passwords or outdated software isn't much better than clicking every e-mail attachment or torrent, as this family shows.

Loading...