标题 | 简介 | 类型 | 公开时间 | ||||||||||
|
|||||||||||||
|
|||||||||||||
详情 | |||||||||||||
[SAFE-ID: JIWO-2025-1210] 作者: ecawen 发表于: [2017-12-24]
本文共 [534] 位读者顶过
安全研究人员发现CryptoMix勒索软件的新变种,将.FILE扩展名附加到加密文件。使用file1@keemail.me,file1@protonmail.com,file1m@yandex.com,file1n@yandex.com和file1@techie.com电子邮件作为受害者联系地址。 [出自:jiwo.org]
Today, BleepingComputer discovered a new variant of the CryptoMix ransomware that appends the .FILE extension to encrypted files and changes the contact emails used by the ransomware.
In this article I will provide a brief summary of any changes that have occurred in this new variant. As we are always looking for weaknesses, if you are a victim of this variant and decide to pay the ransom, please send us the decryptor so we can take a look at it. You can also discuss or receive support for Cryptomix ransomware infections in our dedicated Cryptomix Help & Support Topic.
While the encryption methods stay the same in this variant, there have been some slight differences. The ransom note is still named _HELP_INSTRUCTION.TXT, but now uses the file1@keemail.me, file1@protonmail.com, file1m@yandex.com, file1n@yandex.com, and file1@techie.comemails for a victim to contact for payment information.
The next noticeable change is the extension appended to encrypted files. With this version, when a file is encrypted by the ransomware, it will modify the filename and then append the .FILE extension to encrypted file's name. For example, a test file encrypted by this variant has an encrypted file name of0D0A516824060636C21EC8BC280FEA12.FILE.
As this is just a cursory analysis of this new variant, if anything else is discovered, we will be sure to update this article.
In order to protect yourself from ransomware, it is important that you use good computing habits and security software. First and foremost, you should always have a reliable and tested backup of your data that can be restored in the case of an emergency, such as a ransomware attack.
You should also have security software that incorporates behavioral detections to combat ransomware and not just signature detections or heuristics. For example, Emsisoft Anti-Malware and Malwarebytes Anti-Malware both contain behavioral detection that can prevent many, if not most, ransomware infections from encrypting a computer.
Last, but not least, make sure you practice the following security habits, which in many cases are the most important steps of all:
For a complete guide on ransomware protection, you visit our How to Protect and Harden a Computer against Ransomware article.
|