Home Malware Programs Ransomware XCry Ransomware

XCry Ransomware

Posted: January 18, 2019

The XCry Ransomware is a file-locking Trojan: a threat that encrypts your files so that they will not open before giving you its ransoming demands for the solution. Paying criminals for decryption services is always undertaken with some risk, and malware experts recommend updating your secure backups for preventing this attempted extortion from having any leverage. Whether or not you restore your files, you should prioritize deleting the XCry Ransomware through appropriate anti-malware tools as prevention for future encryption issues.

A Special Sighting of the Nimrod Trojans in the Wild

Nimrod, or Nim, is one of the less-important programming languages for threat actors operating in the threatening encryption sector. While most Ransomware-as-a-Service businesses and other, file-locking Trojans' campaigns use different resources, Nim is freely available for abuse, and at least one criminal is taking advantage of it. The Nim's self-hosted compiler has sufficient flexibility to allow for porting to Android and iOS mobile systems, but, so far, malware experts confirm just Windows versions of the XCry Ransomware.

The XCry Ransomware uses the usual strategy of encrypting each file on an individual level and adding its extension ('.xcry7684') as a tag to their names. Along with the 'usual suspects,' such as text documents or pictures, malware experts find the XCry Ransomware encrypting data such as Java and JavaScript, Python, Perl, Delphi, C++, WinZip, 7-Zip and WinRar files. Since the encryption routine's security is under an investigation, users shouldn't presume that breaking it is impossible and may contact an experienced AV industry professional for their help on the unlocking or decryption solution.

The threat actor delivers his ransoming demands through an HTML page that the XCry Ransomware creates for the user's reading. However, it offers few instructions, besides an e-mail for negotiating, and the location of the 'encryption_key' ID file that's mandatory for the decrypting of files. Users should preserve the latter until they can get their files back since malware experts, sometimes, find these credentials helpful for unlocking data or building a general-purpose decryptor.

Softening the Cry Over New Trojans

A Nim-compiled Trojan with file-blocking capabilities is a rarity, but the XCry Ransomware's brute impact is very similar to that of the Hidden Tear freeware or RaaS family of the Globe Ransomware. Users always should back up their work to other devices for restoring it readily and securely, instead of hoping that the threat doesn't erase locally-available ones. Network security also should be minded for preventing file-locking Trojans from accessible both mapped and unmapped drives that don't block it with strong passwords or other means.

Most anti-malware brands are detecting the XCry Ransomware heuristically as being a generic threat with non-consensual, data-encrypting properties. Infection possibilities that malware experts advise looking out for include e-mail attachments (particularly ones with unexpected documents) and torrents, although some threat actors use brute-force means of compromising business and government networks. Always have your preferred anti-malware product eliminate the XCry Ransomware, whether by quarantining or deleting it outright, before beginning any data-restoring strategies.

With its possibilities ranging into, not just desktops or laptops, but mobile phones, as well, the XCry Ransomware is a potential issue that may be locking files for more than computer users, soon. The dangers of threatening, Nim-based Trojans are numerous, but, as always, preventable by nothing more than well-worn security standards.

Related Posts

Loading...