• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

WORMCRYPT0R Ransomware

December 24, 2018Simeon Georgiev

As ransomware removal experts keep on working on new methods to neutralize cryptovirological encryptions, the developers come up with newer scripts that need unique decryption measures. The development of new ransomware strains is so rapid that entire teams of malware hunters are dedicated to proactively search for new cryptovirological scripts on the cyberspace. A team of such cybersecurity professionals has discovered new ransomware that goes with the name WORMCRYPT0R. A lot about this latest ‘offering’ from cryptovirological operators is still mysterious. According to the available information, WORMCRYPT0R operators are either using RSA or AES encryption modules to lock down the files on the targeted device.

WORMCRYPT0R ransomware might also make changes in the Windows Registry to equip the script with the attribute of auto-execution. This means switching off the device in the middle of encryption won’t stop. The encryption will resume whenever you will switch on the device.

After the completion of encryption, a ransom note in a text file “WORMCRY” appears on the desktop. Even the note doesn’t tell much about the malware. The operators haven’t mentioned the amount of money they are asking to provide ransomware removal. However, they have provided an email address in the note. They direct the victims to contact them within 24 days to recover the encrypted files.

They further claim that the encrypted files can’t be retrieved after 24 hours because the decryption key is automatically destroyed at the end of the deadline. We strongly advise the targeted victims to not contact the attackers. There is no guarantee that they will give you the decrypter after receiving the extortion amount. The better way to deal with the attack is to get professional ransomware removal experts on board. Also, develop a habit of backing up your data on regular basis to tone down the effects of ransomware infection.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post The Latest Variant of GandCrab Ransomware Next post Cryptovirological Discovery: EQ Ransomware

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.