We’ve also noted how ransomware are getting different, regional varieties despite using pedestrian techniques. However, this can be an indication of how ransomware operators are diversifying to victimize more users, and consequently turn in more profit. The previous week had a miscellany of ransomware families targeting specific victims (or regions). Among them is CryptoJacky (detected by Trend Micro as RANSOM_CRYPJACKY.A), which sported a ransom note in Spanish. CryptoJacky is a compilation of modifiable Visual Basic scripts, and encrypts the files of affected systems through an open-source tool, AES Crypt (aesencrypt.exe). Encrypted files are appended with the extension, .aes. Analysis also indicates it possibly came from a ransomware builder. After execution, CryptoJacky unpacks its components in %appdata%\r_tools\. A list of files it targets to encrypt are also in the same directory.
Slovak and Czech-speaking users were also targeted by Czech Ransomware (RANSOM_CZCRYPT.A). Czech Ransomware’s ransom note appears as a pop-up window in the affected machine. In its ransom note, it touts to have encrypted files using AES-256 encryption algorithm, appends an .ENCR extension in the infected file, and demands a ransom paid in Bitcoin. Czech Ransomware targets files located in: Contacts, Desktop, Documents, Downloads, Favorites, Links, Music, Pictures, SavedGames, SavedSearches, and Videos.
The AvastVirusinfo ransomware (Ransom_XORIST.MGW), also known as XORIST, is a malware whose components were compiled using open-source Minimalist GNU for Windows (MinGW). Analysis indicates that this version seems to be employing a multi-component technique. The executable (EXE) file, for instance, will not execute on its own, and would need other components. It also seems to be targeting Russian-speaking users, given the language of the ransom note. It's also one of the most prolific, capable of encrypting 1,796 file types, which are appended with the extension name, .A9v9AhU4.
Ransomware based on open-source projects like EDA2 and Hidden Tear also emerged last week. This includes Enjey Crypter (RANSOM_HiddenTearEnjey.A) which is based on EDA2’s source code. It is capable of deleting the infected machine’s backup (shadow copies), via the command, - vssadmin delete shadows /all /Quiet. Enjey Crypter encrypts files in all directories except Program Files (x86), $Recycle.Bin, Windows, Boot, and System Volume Information.
Enterprises can benefit from a multi-layered, step-by-step approach in order to best mitigate the risks brought by these threats. Email and web gateway solutions such as Trend Micro™ Deep Discovery™ Email Inspector and InterScan™ Web Security prevents ransomware from ever reaching end users. At the endpoint level, Trend Micro Smart Protection Suites deliver several capabilities like high-fidelity machine learning, behavior monitoring and application control, and vulnerability shielding that minimizes the impact of this threat. Trend Micro Deep Discovery Inspector detects and blocks ransomware on networks, while Trend Micro Deep Security™ stops ransomware from reaching enterprise servers–whether physical, virtual or in the cloud.
For small businesses, Trend Micro Worry-Free Services Advanced offers cloud-based email gateway security through Hosted Email Security. Its endpoint protection also delivers several capabilities such as behavior monitoring and real-time web reputation in order detect and block ransomware.
For home users, Trend Micro Security 10 provides strong protection against ransomware by blocking malicious websites, emails, and files associated with this threat.
Users can likewise take advantage of our free tools such as the Trend Micro Lock Screen Ransomware Tool, which is designed to detect and remove screen-locker ransomware; as well as Trend Micro Crypto-Ransomware File Decryptor Tool, which can decrypt certain variants of crypto-ransomware without paying the ransom or the use of the decryption key.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.