CryptoDevil Ransomware
Posted: March 20, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 30 |
First Seen: | March 20, 2017 |
---|---|
OS(es) Affected: | Windows |
The CryptoDevil Ransomware is a threat that was discovered by malware researchers on a popular platform used to share and analyze threat samples. The first impressions about the CryptoDevil Ransomware are that it is a relatively low-quality piece of ransomware, but it is worth nothing that it features a fully working encryption algorithm, and running it on a computer will allow it to encrypt files. However, it is likely that the CryptoDevil Ransomware is still in development since the ransomware is programmed only to encrypt the files stored in the folder where it is executed. This means that if the file is downloaded and launched in the Desktop, then only the files stored there will be locked. All files that are locked by the CryptoDevil Ransomware also will be renamed by appending '.devil' to their names.
When the CryptoDevil Ransomware's encryption routine is complete, the threat launches a new program window that uses a background and includes some information about the attack, along with instructions on how the victims can recover their data. According to the message, the price starts at $20 and is then increased every 24 hours - $30 after 24 hours, $50 after 48 hours, $100 after 72 hours gradually. The note threatens the victims that if the ransom is not paid for in 82 hours, then their decryption key will be purged permanently, therefore making the recovery of their files impossible. Although the attacker asks for money, they haven't left a Bitcoin wallet address to send payments to so that's another sign that the CryptoDevil Ransomware is still in development. The author calls himself 'mutr0l' and has left the following contact details - contactcryptodevil@gmail.com and mutr0lblackhat@gmail.com.
The CryptoDevil Ransomware wasn't Let Loose on Purpose
An anonymous account on Twitter who claims to be the author of the CryptoDevil Ransomware states that the project is meant to be for personal and educational use, and the ransomware is not meant to be distributed in the wild. However, since the product appears to be fully weaponized, then it is important to know how it functions and what measures must be taken to prevent it from encrypting your files. The best security measure against crypto-threats like the CryptoDevil Ransomware is to use a reputable anti-malware software suite that will keep you protected from incoming threats. Of course, it also is good to follow some safe browsing tips such as avoiding to download suspicious files, as well as to check e-mail attachments carefully by using a suitable anti-virus tool.
We'd like to remind our readers that while dealing with ransomware can be very unpleasant, they should keep in mind that sending money to cyber crooks is not a reliable way to resolve any issues caused by a crypto-threat. Regardless if the threat is the CryptoDevil Ransomware or another file-encryption Trojan, the recommended way to recover from an attack is to run a credible anti-malware utility that will eliminate the intruder. As for the encrypted file, some 3rd-party file recovery utilities might achieve partial results if a free decryptor is not available.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.