Home Malware Programs Ransomware Work Ransomware

Work Ransomware

Posted: December 15, 2017

The Work Ransomware is a CryptMix Ransomware family member that takes your media hostage by enciphering it and makes messages asking for you to pay for recovering it. Users always should test any free decryption solutions for file-locking threats before taking steps that may not guarantee the recovery of any content or reward cybercrooks for their reproachable behavior. Traditional anti-malware protection also may block or remove the Work Ransomware, which reduces the chances of any data loss.

The Programs Who Put Your Files to Work Motivating Ransoms

Whether its victims call it CryptoMix, CryptMix Ransomware, or one of its many, small brand names, this family of file-locking Trojans remains a popular alternative to Hidden Tear among threat actors. The latest version of the software malware researchers are verifying is the Work Ransomware, which has few changes in its set of features but is illustrative of how the cybercrooks are continuing to try to hold many of the most ubiquitous formats of media hostage. Modern iterations, like the Work Ransomware, also may have less dependency on network connections for delivering their data-damaging attacks.

A traditional infection vector for the Work Ransomware is a drive-by-download exploit that threat actors embed into documents, usually, via macros that the user chooses to enable. After activating this content, the script installs and runs the Work Ransomware, which may use a slightly different means of blocking your data, depending on whether it uses its internal database of offline keys or ones that it downloads from a remote server. Examples of the Work Ransomware's encryption methodology always are double-layered, such as the AES-256 and RSA, which provides sufficient security to hinder any casual file-unlocking attempts.

The Work Ransomware also encodes the name of any file it locks, which gives it the appearance of having a random string of thirty-two alphanumeric characters, and adds a new extension ('.WORK') that other CryptMix Ransomware versions don't use. It also gives the victims a set of Notepad instructions for contacting a threat actor at one of several e-mail accounts, which, malware experts emphasize, may be a setup for extortion.

Stopping a Trojan's Campaign from Working Out

While victims that may need to enable macros of their own will to subject their PCs to the infection, the Work Ransomware's family also is notable for using different threat actors who may prefer other installation exploits. Traditional anti-malware products should block most attempts that don't involve the cybercrooks directly compromising a server by collecting the login password. Since the Work Ransomware's payload suppresses its symptoms until after it locks your content, having preemptive security protocols is critical.

There are non-ransomed decryption programs that are compatible with different versions of the CryptMix Ransomware family, and malware experts encourage that users test them before risking any con artist-recommended payments. The file types that are especially probable of being part of the Work Ransomware's internal list of vulnerable media, such as Word documents or JPG pictures, also can benefit from backups that you store in another, secure location. Regardless, while anti-malware products can and should be allowed to uninstall the Work Ransomware, they can't decrypt or unlock your files.

The Work Ransomware is a very new release of the CryptMix Ransomware with not all information about its campaign determinable. With that ignorance of further details in mind, victims should stay vigilant about protecting their files from harm in the first place instead of setting themselves up for extortion from the latest hire of a Ransomware-as-a-Service (RaaS) product.

Related Posts

Loading...