Home Malware Programs Ransomware Xlockr Ransomware

Xlockr Ransomware

Posted: July 30, 2018

The Xlockr Ransomware is a file-locking Trojan that can use encryption or other means of data corruption for blocking your documents, pictures and other work. Although the Trojan's payload shouldn't harm any essential files, such as the Windows components, it may prevent you from opening personal, recreational or professional media of any format virtually. Let your anti-malware programs remove the Xlockr Ransomware as soon as they identify it, and have backups available for making your file recovery process both painless and inexpensive.

Programmers Taking Trojan Brands that aren't Theirs

One of the most widely-circulated families of file-locker Trojans, a Ransomware-as-a-Service business that goes by names such as WannaCryptor Ransomware, '.wcry File Extension' Ransomware, or simply 'WannaCry,' is an occasional source of plundering by unaffiliated threat actors. Criminals who use other, free sources of Trojans, sometimes design their campaigns for resembling that family cosmetically, which is significant both for its prominence in the dark web and its encryption security. The final product, often, is something like the Xlockr Ransomware: a file-locking Trojan that looks just like a different program with the same symptoms.

The Xlockr Ransomware campaign is one that malware experts only are seeing underway as of late July, with few samples in evidence and low overall distribution statistics. The Trojan's locking routine may include blocking file data by corrupting it, placing it into a password-protected archive, or encrypting it with an algorithm, such as AES, XOR or RSA. Victims may spot shared extensions or Base64-based changes to the filenames of any affected content, which is likely of encompassing both work documents, databases, and spreadsheets, along with media, such as pictures, audio and movies.

The Xlockr Ransomware's unknown author is choosing to use an almost identical copy of the original '.wcry File Extension' Ransomware's HTA pop-up for a ransom note. Although the Xlockr Ransomware uses the same, Bitcoin-based ransoming requests as most file-locker Trojans, malware experts also took notice of an unusual addition. The Xlockr Ransomware includes a very short, secondary countdown that raises the cost of the ransom every minute, along with a three-day timer before the elapse of the decryption service. The added timing pressure makes it more likely that a victim will panic and pay before realizing that free recovery options may be available.

Getting Off an Unwanted Program's Countdown

There is no evidence of the Xlockr Ransomware's being a real member of the diverse and profitable '.wcry File Extension' Ransomware family and its file-locking encryption may or may not be as difficult to break. Any users with interest in assisting with ongoing decryption research should provide samples of all relevant files to an appropriate cyber-security researcher. Besides using a free decryption solution, malware analysts also recommend saving all work to portable devices and cloud-based storage for a reliable recovery against file-locking Trojans like the Xlockr Ransomware.

Since its campaign is very newly-dated, the Xlockr Ransomware's strategy for infection is under investigation. For this year, e-mail spamming campaigns often have close relationships with Trojans that use file-locking attacks, and malware experts also observe correlations between vulnerable PCs with poor password login security and these infections. However, any computer with appropriate anti-malware software should delete the Xlockr Ransomware by default.

The Xlockr Ransomware is one of many 'chameleon' Trojans taking advantage of a competing threat's success. Since judging by looks can cause further problems, such as using the wrong decryption solution, it's best for most PC users to leave identifying infections to the professionals.

Loading...