Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
New Backup Cryptomix Ransomware Variant Actively Infecting Users
#1
Today MalwareHunterTeam discovered a new variant of the Cryptomix Ransomware that appends the .BACKUP extension to encrypted files, changes the contact email, and slightly changes the ransom note's name.

In this article I will provide a brief summary of any changes that have occurred in this new variant.  As we are always looking for weaknesses, if you are a victim of this variant and decide to pay the ransom, please send us the decryptor so we can take a look at it. You can also discuss or receive support for Cryptomix ransomware infections in our dedicated Cryptomix Help & Support Topic.

Changes in the BACKUP Cryptomix Ransomware Variant
While the encryption methods stay the same in this variant, there have been some slight differences. The text of the ransom note has been changed and now uses the backuppc@tuta.io, backuppc@protonmail.com, backuppc1@protonmail.com, b4ckuppc1@yandex.com, b4ckuppc2@yandex.com, and backuppc1@dr.com email addresses for a victim to contact for payment information.

[Image: ransom-note.jpg]

The next noticeable change is the extension appended to encrypted files. With this version, when a file is encrypted by the ransomware, it will modify the filename and then append the .BACKUP extension to encrypted file's name. For example, a test file encrypted by this variant has an encrypted file name of 0D8802E027ABFF51DFE0BA602B23E305.BACKUP.

[Image: encrypted-folder.jpg]

Unfortunately, at this time the ransomware cannot be decrypted for free. As this is just a cursory analysis of this new variant, if anything else is discovered, we will be sure to update this article.

How to protect yourself from the BACKUP CryptoMix Ransomware
In order to protect yourself from ransomware, it is important that you use good computing habits and security software. First and foremost, you should always have a reliable and tested backup of your data that can be restored in the case of an emergency, such as a ransomware attack.

You should also have security software that incorporates behavioral detections to combat ransomware and not just signature detections or heuristics.  For example, Emsisoft Anti-Malware and Malwarebytes Anti-Malware both contain behavioral detection that can prevent many, if not most, ransomware infections from encrypting a computer.

Last, but not least, make sure you practice the following security habits, which in many cases are the most important steps of all:

Backup, Backup, Backup!
Do not open attachments if you do not know who sent them.
Do not open attachments until you confirm that the person actually sent you them,
Scan attachments with tools like VirusTotal.
Make sure all Windows updates are installed as soon as they come out! Also make sure you update all programs, especially Java, Flash, and Adobe Reader. Older programs contain security vulnerabilities that are commonly exploited by malware distributors. Therefore it is important to keep them updated.
Make sure you use have some sort of security software installed that uses behavioral detections or white list technology. White listing can be a pain to train, but if your willing to stock with it, could have the biggest payoffs.
Use hard passwords and never reuse the same password at multiple sites.

SOURCE
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  New Variant of IcedID Banking Trojan Spreading Wildely mrtrout 0 995 06-29-2021 , 11:24 PM
Last Post: mrtrout
  Latest Mirai Variant Targets SonicWall, D-Link and IoT Devices Bjyda 0 916 03-17-2021 , 04:27 PM
Last Post: Bjyda
  Plex Media servers actively abused to amplify DDoS attacks Bjyda 0 1,050 02-04-2021 , 11:46 PM
Last Post: Bjyda
  Hackers are targeting other hackers by infecting their tools with malware dhruv2193 0 1,632 03-12-2020 , 12:16 PM
Last Post: dhruv2193
  Hackers are targeting other hackers by infecting their tools with malware sidemoon 0 2,163 03-10-2020 , 03:55 PM
Last Post: sidemoon

Forum Jump:


Users browsing this thread: 1 Guest(s)