Home Malware Programs Ransomware Zixer2 Ransomware

Zixer2 Ransomware

Posted: April 6, 2017

The Zixer2 Ransomware is a member of the Xorist Ransomware family of Trojans that lock your files with an XOR-based cipher for future ransoming. Both freeware decryption applications and backups can help you recover any blocked media, either of which malware experts recommend instead of paying an extortionist's ransoms. Having thorough anti-malware protection also can help users delete the Zixer2 Ransomware without letting its payload, and the associated damages, take place.

A Spike in the Ongoing Revival of Outdated Encryption Attacks

Although not the most famous family of file-encryptor Trojans, the Xorist Ransomware is notable for at least one thing: using insecure algorithms like XOR to lock the files of its victims. Variants of this threat appear periodically, fueled by the relatively open availability of its code, which malware experts see in new threats like the March's 'avastvirusinfo@yandex.com' Ransomware, or April's candidate: the Zixer2 Ransomware. Infection vectors for this new Trojan's campaign remain under determination, although experts are estimating its overall distribution numbers as being small-scale.

Depending on how the threat actors configured it, the Zixer2 Ransomware can encipher and lock your files with either a XOR or TEA-based algorithm, which reallocates the existing, internal file data so as to make it illegible. The Zixer2 Ransomware also adds the '.zixer2' extension onto any already-extant formatting tag in the filename, which you can search for to identify all cases of any blocked media. Documents, spreadsheets, images, archives, and audio are some of the content most subject to harmful encryption attacks.

The Zixer2 Ransomware's author chose to provide minimal information for the victim to help themselves other than an e-mail address that malware experts have yet to see in connection with other Trojan campaigns. In most circumstances, on artists request contact solely for the purpose of demanding non-refundable formats of ransom money, after which they can choose to withhold the decryption solution.

Nixing the Zixer2 Ransomware's Extortion Plans

As of the first week of April, the Zixer2 Ransomware's threat actors are distributing the Trojan through channels targeting Italian PC users. These exploits may include compromised websites hosting bundles of script-based exploits, fake downloads, or e-mail spam campaigns. Disabling Java and other, advanced browser content can block some drive-by-download attacks, and anti-malware products can cover a majority of all vulnerabilities.

The Zixer2 Ransomware is, like other Xorist Ransomware variants, a Trojan that's susceptible to decryption from existing, free software. XOR-based Trojans often can have their file-encrypting attacks reversed in whole without needing any form of assistance from the people holding your decryption key. However, malware experts do recommend backing up files that are of any value due to the prominence of Trojans harder to decode than the Zixer2 Ransomware.

Few anti-malware utilities should encounter notable difficulties with deleting the Zixer2 Ransomware when provided the opportunity to scan your downloads or overall system for threats. However, there are always more con artists willing to bend freeware into new attack tools, turning maintaining your data's security into a daily discipline.

Loading...