CryptON Ransomware Installed Using Hacked Remote Desktop Services
A new and active campaign for the CryptON Ransomware is currently underway where attackers are hacking into computers with Internet accessible Remote Desktop Services.
Once the attackers gain access to the computer they manually execute the ransomware and encrypt your files.
When installed, CryptON will encrypt a victim's files and append the .ransomed@india.com extension to the encrypted file's name. This means that a file named 1.jpg would be encrypted and renamed to 1.jpg.ransomed@india.com as shown below.
In each folder that files are encrypted, a ransom note named HOWTODECRYPTFILES.html will also be created that contains instructions on what has happened and how to connect to a TOR support site to receive instructions.
The CryptON support site is nothing fancy. It just has a chat form that you can use to communicate with the attackers in order to receive payment instructions.
It is not possible to decrypt the CryptON Ransomware Variant
Unfortunately, at this time there is no way to decrypt files encrypted by the CryptON Ransomware variant for free.
The only way to recover encrypted files is via a backup, or if you are incredibly lucky, through Shadow Volume Copies. Though CryptON does attempt to remove Shadow Volume Copies, in rare cases ransomware infections fail to do so for whatever reason. Due to this, if you do not have a viable backup, we always suggest people try as a last resort to restore encrypted files from Shadow Volume Copies as well.
How to protect yourself from the CryptON Ransomware?
In order to protect yourself from CryptON, or from any ransomware, it is important that you use good computing habits and security software. First and foremost, you should always have a reliable and tested backup of your data that can be restored in the case of an emergency, such as a ransomware attack.
As the CryptON Ransomware is commonly installed via hacked Remote Desktop services, it is very important to make sure its locked down correctly. This includes making sure that no computers running remote desktop services are connected directly to the Internet. Instead place computers running remote desktop behind VPNs so that they are only accessible to those who have VPN accounts on your network.
It is also important to setup proper account lockout policies so that it makes it difficult for accounts to be brute forced over Remote Desktop Services.
You should also have security software that incorporates behavioral detection's to combat ransomware and not just signature detections or heuristics.
Last, but not least, make sure you practice the following good online security habits, which in many cases are the most important steps of all:
Backup, Backup, Backup!
Do not open attachments if you do not know who sent them.
Do not open attachments until you confirm that the person actually sent you them,
Scan attachments with tools like VirusTotal.
Make sure all Windows updates are installed as soon as they come out! Also make sure you update all programs, especially Java, Flash, and Adobe Reader. Older programs contain security vulnerabilities that are commonly exploited by malware distributors. Therefore it is important to keep them updated.
Make sure you use have some sort of security software installed.
Use hard passwords and never reuse the same password at multiple sites.
If you are using Remote Desktop Services, do not connect it directly to the Internet. Instead make it accessibly only via a VPN.
All Users are requested to:
- Install and keep NPAV updated up-to-date.
- Make sure NPAV Data Backup is ON.
- Always use trusted and secure sites for downloading setups.
Net Protector customers are protected from such new and dangerous ransomware.
Comment(s)
Categories
- Other (42)
- Ransomware (124)
- Events and News (26)
- Features (44)
- Security (423)
- Tips (79)
- Google (22)
- Achievements (8)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (187)
- Cyber Attack (219)
- Data Backup (11)
- Data Breach (75)
- Phishing (138)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (55)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (57)
- Social Media (7)
- vulnerability (53)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (4)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)
Recent Posts
Helldown Ransomware Expands to VMware and Linux: A New Threat to Critical Infrastructure
November 20, 2024
Thousands of Fake Shopping Sites Launched to Steal Credit Card Data During Black Friday
November 15, 2024
Archive
Tags
cyber attack
phishing
data breach
ransomware
ransomeware
android malware
cyber security
malware
financial security
phishing attack
data stealing
ddos
cybercrime
critical vulnerability
trojan
twitter
cyber threat
phishing email
microsoft
data theft
cert-in
lockbit
india
december cyber attacks
pakistan-backed hacker
occasion
financial fraud
cryptojacking
clop gang
clop gang extorting
data security
user data leak
android apps
phishing scam
play store
advanced malware
android
whatsapp
clop
email phishing
fedex
cyber crime
malicious apps
pakistani hackers
net protector total security
cyber attack in india
google play store
independence day
winrar
pune