Home Malware Programs Ransomware Wyvern Ransomware

Wyvern Ransomware

Posted: September 22, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 117
First Seen: September 22, 2017
Last Seen: August 24, 2020
OS(es) Affected: Windows

The Wyvern Ransomware is a Trojan that encrypts your media to collect ransom money by offering to sell you the decryption tool's services. This threat is an affiliate of the so-called Blank Slate campaign, and its installer may arrive as an attachment to a blank email message that's using a fake sender address. Victims should use anti-malware tools to block or remove the Wyvern Ransomware while giving it as little access to their files as possible and recover any damaged content through previous backups.

A New Predator's Silhouette Shadowing Your Files

The BTCWare Ransomware group appears to have either a new member or a close copycat, as malware experts and other PC security industry researchers confirm the new distribution of a Trojan sharing most of that family's symptoms. This Trojan, the Wyvern Ransomware, also is a likely candidate for being distributed under the RaaS model that allows a second threat actor to handle how it circulates and what address collects the ransom money. Although its name is new, the Wyvern Ransomware conducts the same attacks of using advanced pop-ups for extortion after succeeding at locking content with encryption attacks.

Standard operations for the Wyvern Ransomware's family use AES-based encoding techniques for encrypting files that can include text documents, pictures and other data types. The key to decoding and unlocking this data also locks itself with a second, usually a RSA-derived cipher. Along with including new '.wyvern' pseudo-extensions, these files also will have their names changed for including an email address and custom ID. While malware experts see no symptoms associated with the file-blocking feature directly, after it finishes, the Wyvern Ransomware does launch a pop-up.

This window delivers ransoming instructions that ask the victim to pay Bitcoins in exchange for getting access to a decryption tool that's compatible with their locked files. Some versions of the BTCWare Ransomware are responsive to unlocking by a third-party, free software, and malware experts recommend sampling these solutions before considering alternatives. Users also should have backups of their most valuable or vulnerable types of media, such as workplace documents and records.

Shooting the Wyvern Ransomware out of the Sky

The Wyvern Ransomware's name is a reference to a variant of the mythical dragon, and, just like that winged reptile, seems to be a small revision to a preexisting threat that's larger than itself. This Trojan is using the Blank Slate campaign's infection vectors currently, responsible for both the Cerber Ransomware and the '.locky File Extension' Ransomware, for compromising Windows PCs. The botnet-based email uses spoofed sender addresses and blank (without content) messages that carry attachments for installing the Wyvern Ransomware and similar threats. In most circumstances, malware experts find that the user would have to ignore or disable multiple security warnings to trigger the Trojan downloader.

Like a majority of Trojans with file-locking behavior, the Wyvern Ransomware can cause permanent damage to any media that it encodes. Most users should practice proactive security steps that could eliminate this threat before it can encrypt the contents of their PCs, such as scanning new downloads with anti-virus software, disabling in-document macros, and confirming the identity of senders before trusting email's attachments. Professional anti-malware programs can detect and delete the Wyvern Ransomware, like any BTCWare Ransomware update, as a threat to your PC.

The omission of a social engineering tactic with the Wyvern Ransomware's delivery mechanism is an unfortunate sign that the Blank Slate campaign is retaining a sustainable rate of infections. Arguably, any PC users rewarding attackers by disabling vital security features manually deserve nothing less than the expensive consequences that the Wyvern Ransomware can put against them.

Loading...