Home Malware Programs Ransomware XData Ransomware

XData Ransomware

Posted: May 22, 2017

Threat Metric

Threat Level: 10/10
Infected PCs: 5
First Seen: May 21, 2017
OS(es) Affected: Windows

The XData Ransomware is a Trojan that can lock your files through an AES-based cipher, which it uses to hold the media up for ransom. Victims should resort to data unlocking strategies not requiring paying a fee to a con artist who may not honor any agreement, and storing backups on other devices can limit this Trojan's capacity for causing damage steeply. Other means of protecting your PC include using standard anti-malware products for identifying and deleting the XData Ransomware during any installation exploit.

The New 'X' Mark that's Crisscrossing Your File Data

Another Trojan campaign specialized in threatening, non-consensual encryption is under investigation in late May, with a sharp uptick in verifiable attacks in the nineteenth. While the Trojan in question, the XData Ransomware, uses English for relaying its extortion demands, many target systems are of either Ukrainian or Russian nationality. The Trojan's payload doesn't deviate majorly from those of past attacks of the same classification, and malware experts are rating it as a potential threat to PC users regardless of their living region or language.

The XData Ransomware's threat actors may carry out the installation of their Trojan through such means as forged e-mail content or exploit kits that they seed onto compromised domains. When it installs itself, the XData Ransomware doesn't initiate any features to distract or alarm the user, and, instead, begins running a background process that encrypts the files matching the target formats silently. The data malware experts are certain are under attack include PDF, DOC, XLS, and JPG, making the XData Ransomware a danger to media primarily.

One of the Trojan's last actions places a Notepad file on your desktop that carries the threat actor's ransoming instructions. Instead of providing the decryptor and withholding the key, as many con artists prefer, the XData Ransomware offers the decryption key for free and gives contact information for buying the decryption application. The extortionists are, as always, free to refuse to help at any point in the process, including after you pay any ransom they request.

Removing the Mark of a Trojan

The XData Ransomware doesn't display any pop-ups or other alerts while it encrypts your local content, and its most visible symptom is the series of '.~xdata~' extensions it adds after the file names. Due to the difficulty of identifying the threat before it finishes locking its targets, malware experts recommend using passive anti-malware features that may detect any threat to your PC automatically. Infection vectors more likely than not to be abused in the XData Ransomware's campaign include corrupted Web-browsing scripted content and compromised documents that often attach themselves to spam e-mails.

Although a user mindful of secure Web-browsing protocols should prevent many infections, some attacks also may occur without fault from the victim, such as drive-by-downloads using zero-day exploits. Malware experts encourage backing up your drive to a secondary one that's disconnected from the primary, which eliminates any possibility the XData Ransomware might have for encrypting or deleting it. Without such a backup, only having automatic anti-malware protection for removing the XData Ransomware can prevent any long-term encryption damage definitively.

Previously, Russia has been a moderate 'safe space' for users worried about threatening software, but the XData Ransomware shows that that landscape is changing. What nation you live in is providing less protection than ever against attacks as simple as data encryption and accompanying extortion increasingly.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 944.12 KB (944128 bytes)
MD5: c6a2fb56239614924e2ab3341b1fbba5
Detection count: 28
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 21, 2017
%APPDATA%\mssql.exe File name: mssql.exe
Size: 68.6 KB (68608 bytes)
MD5: a0a7022caa8bd8761d6722fe3172c0af
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: May 21, 2017

Related Posts

Loading...