Cryp70n1c Ransomware
Posted: November 27, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 28 |
First Seen: | January 27, 2022 |
---|---|
Last Seen: | January 27, 2022 |
OS(es) Affected: | Windows |
The Cryp70n1c Ransomware appears to be the product of a group of cybercrooks who call themselves 'Cryp70n1c Army.' The good news is that their programming skills are probably not that advanced since their file-encryption Trojan is based on the HiddenTear project, an open-source file-encryption Trojan, which seems to be a rather popular ransomware builder among cybercrooks who are not that good at creating their own threatening programs. Thankfully, the author of HiddenTear is one of the good guys, and he has implemented a flawed technique to generate the encryption key intentionally, therefore making it possible to recover the key required to decrypt the data of the victims. In short, this means that victims of the Cryp70n1c Ransomware would be able to use a free decryption tool to get their files back.
The threat appears to be distributed as a fake hacking tool used to access password-protected PDF files. However, instead of a working tool, users who want to use it will end up infecting their computers with the Cryp70n1c Ransomware, therefore giving the threat a chance to encrypt a significant portion of their files. All locked files will suffer a small name change by adding the '.Cryp70n1c' extension to their names.
The ransom message can be found in the file 'READ_IT.txt,' but the threat also will use an image to replace the user's desktop wallpaper. The peculiar thing is that the style and color of the image resemble the design of the Petya Ransomware. However, these threats are not at all related to each other. The Cryp70n1c Ransomware is much less threatening, and its victims will not need to pay any money to get their data back. According to the instructions provided by the attackers, victims can get their hands on a decryption tool as soon as they pay a ransom sum of 0.05 Bitcoins, and then contact ransom@deliveryman.com. Thankfully, none of this will be necessary if you opt to use a free technique to recover from the Cryp70n1c Ransomware's attack.
We advise users whose files were locked by the Cryp70n1c Ransomware to download and run their favorite anti-malware scanner immediately since this is the quickest way to ensure that all corrupted files will be wiped from the computer. After completing the removal of the Cryp70n1c Ransomware, it is recommended to download and run a free HiddenTear decryption program that will guide you through the file recovery process.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.