Home Malware Programs Ransomware CryptoWire Ransomware

CryptoWire Ransomware

Posted: October 28, 2016

The CryptoWire Ransomware is a Trojan most likely developed as a proof of concept experiment to educate security researchers on the functions of file-encrypting threats. Although its author has limited critical aspects of its ransom features to prevent its abuse by con artists, the CryptoWire Ransomware does contain a variety of potentially damaging attack features when it's launched on unprotected PCs. Follow standard anti-malware procedures for uninstalling the CryptoWire Ransomware in cases where its presence is unintended or misapplied.

A Trojan Missing Its Most Important Parts

The motivations behind designing Trojans aren't always as threatening as the software, itself. Although some software developers choose to design such programs to educate others on their capabilities, these projects sometimes are put to unintended purposes, such as the numerous variants of EDA2 and Hidden Tear-based threats. The CryptoWire Ransomware is another file encrypting Trojan of a similar origin that, hopefully, can avoid this consistency of exploitation by con artist hands.

The CryptoWire Ransomware is an AutoIT-based Trojan that lacks an administration panel for being controlled by remote attackers. Another, meaningful exclusion by its author is a missing UI option for purchasing its decryption key, although most other options, including the decryption feature, are present. In kind with similar Trojans, the CryptoWire Ransomware displays these features and its extortion message after encrypting your data and blocking files arbitrarily. The CryptoWire Ransomware uses the unusually strong AES-256 algorithm for this purpose, and malware experts find it capable of targeting popular cloud service storage, network-accessible drives and peripheral devices.

The CryptoWire Ransomware's payload also includes a variety of potentially threatening attacks that aren't in widespread use among most live-deployed threats, such as:

  • The CryptoWire Ransomware uses a domain check to determine whether or not the infected PC is a personal machine or a corporate one. If the latter, it multiplies the demanded ransom fee by ten.
  • Old file data that could help restore encrypted content is overwritten multiple times before being deleted permanently, including the Recycle Bin.
  • The CryptoWire Ransomware targets files according to a variable size limit, instead of targeting data by what extension is in use. This change in attack implementation places the CryptoWire Ransomware in a position to do much more damage to a PC or entire network than most file encryptor Trojans.
  • The Trojan's payload also includes limited spyware features for unknown reasons, such as keylogging (the feature of recording your typed keystrokes to a log).

Keeping the Might of Threat Education on Your Side

Because of its selective omission of necessary components that are mandatory for a real threat campaign, the CryptoWire Ransomware is not likely to be deployed in the wild without seeing additional work by a talented threat developer. On the other hand, if an individual executes it unintentionally, the CryptoWire Ransomware can be a source of extremely widespread data loss through its indiscriminate data-encoding attacks. Affected PC owners may, first, wish to see if the CryptoWire Ransomware's built-in decryption feature functions in their version of the Trojan before taking other actions.

Like other file encrypting Trojans, regardless of why they were programmed, removing the CryptoWire Ransomware is a task you should delegate to any available anti-malware software. Accidental or mismanaged installations of the CryptoWire Ransomware do have the potential to damage your operating system and its startup repair features, which may require booting from an external device (most commonly, your USB drive).

One might hope that the CryptoWire Ransomware will see a bright future for informing interested parties on the payloads of these threats without providing con artists with new tools. However, based on the patterns already seen with threats like the numerous spin-offs of Hidden Tear, history is not on the CryptoWire Ransomware's side.

Update November 14th, 2018 — Cryptre Ransomware

The Cryptre Ransomware is a variant of the CryptoWire Ransomware, a proof-of-concept project that demonstrates file-locking and ransoming. Since the Cryptre Ransomware is threatening to your PC's contents as any other file-locker Trojan equally, you should protect any critical data by backing it up and avoiding traditional security issues that could provoke infections, such as using weak network passwords. A majority of anti-malware programs should eliminate the Cryptre Ransomware safely and minimize any encryption issues.

An Elderly Family of Threats Refuses to Succumb to Old Age

The relatively small family of file-locking Trojans going by the name of CryptoWire Ransomware is experiencing new interest from threat actors since its first releases, years ago. The Cryptre Ransomware is several months more current than the other versions that malware experts took note of since the original threat's appearance, such as the HAHAHA Ransomware, the KingOuroboros Ransomware, the UltraLocker Ransomware and the misleadingly-named WanaCry4 Ransomware. Its payload, however, shows few adjustments for making it any less threatening to your files.

The source of the Cryptre Ransomware's code is an AutoIT program that's 'open source,' and, therefore, available to threat actors indiscriminately. Previous campaigns deploy minor variants of it around the world, such as in Brazil, although the infection exploits are flexible. Even though the Cryptre Ransomware, like other the CryptoWire Ransomware updates, uses a standard, AES encryption routine for locking files, there is no decryption solution available for free.

After it locks the document, picture or other media type, the Cryptre Ransomware inserts '.encrypted' extensions between the filename's main text and the original extension. The Cryptre Ransomware also creates a pop-up that it shares between both its family and other, unrelated file-locker Trojans, which displays a UI with a list of the hostage media, a Bitcoin-purchasing button and the decryption or unlocking feature. Victims should ignore the ransoming option for the decryptor, as long as they have any other means of recovering the files and be aware of the possibility of the Cryptre Ransomware's author taking the money without providing a key.

The Least Safe Windows Update You can Get

The Cryptre Ransomware's executable uses the generically-appropriate tactic of pretending that it's an update for Windows, which may be making its presence on the PC seem less notable or serve the extra purpose of tricking users into launching it. Fake Windows patches are a prominent sub-category of malvertising on unsafe ad networks. Malware experts recommend disabling advertisements, pop-ups and scripted content, like JavaScript, for improving one's Web-browsing safety against these social engineering attacks, and always download their software updates from an appropriate, company-endorsed site.

Besides the immediate problem of illegible files, the Cryptre Ransomware includes an additional feature for keylogging or recording your keyboard input to a log that it uploads to the threat actor's C&C server. Such attacks are responsible for collecting information, in most cases, although its use for a file-locker Trojan is less straightforward. Users should have a professional anti-malware tool delete the Cryptre Ransomware, restore any files from their backups, and re-secure any credentials by standardized means, such as changing all passwords.

Even though the CryptoWire Ransomware is old news, its attacks retain some relevance to the modern cyber-security landscape. Users who aren't backing their files up are putting themselves at risk, not just from every new Trojan, but from modest updates of old ones, too.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to CryptoWire Ransomware may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

* See Free Trial offer below. EULA and Privacy/Cookie Policy.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

SpyHunter Free Trial: Important Terms & Conditions

The SpyHunter Trial version includes, for one device, a one-time 7-day Trial period for SpyHunter 5 Pro (Windows) or SpyHunter for Mac, offering comprehensive malware detection and removal functionality, high-performance guards to actively protect your system from malware threats, and access to our technical support team via the SpyHunter HelpDesk (or the number of devices set forth in the promotional materials/purchase page). You will not be charged upfront during the Trial period, although a credit card is required to activate the Trial. (Prepaid credit cards, debit cards, and gift cards are not accepted under this offer.) The requirement for your payment method is to help ensure continuous, uninterrupted security protection during your transition from a Trial to a paid subscription should you decide to purchase. Your payment method will not be charged a payment amount upfront during the Trial, although authorization requests may be sent to your financial institution to verify that your payment method is valid (such authorization submissions are not requests for charges or fees by EnigmaSoft but, depending upon your payment method and/or your financial institution, may reflect on your account availability). You can cancel your Trial by contacting EnigmaSoft no later than two business days before the 7-day Trial period expires to avoid a charge coming due and being processed immediately after your Trial expires. If you decide to cancel during your Trial, you will immediately lose access to SpyHunter. If, for any reason, you believe a charge was processed that you did not wish to make (which could occur based on system administration, for example), you may also cancel and receive a full refund for the charge any time within 30 days of the date of the purchase charge. See FAQs.

At the end of the Trial, you will be billed upfront immediately at the price and for the subscription period as set forth in the offering materials and registration/purchase page terms (which are incorporated herein by reference; pricing may vary by country or promotion per purchase page details) if you have not timely canceled. Pricing typically starts at $72 for 3 months (SpyHunter Pro Windows) and $42 for 3 months (SpyHunter for Mac). Your purchased subscription will be automatically renewed in accordance with the registration/purchase page terms, which provide for automatic renewals at the then applicable standard subscription fee in effect at the time of your original purchase and for the same subscription time period or as set forth in the promotion materials/purchase page, provided you’re a continuous, uninterrupted subscription user. Please see the purchase page for details. Trial subject to these Terms, your agreement to EULA/TOS, Privacy/Cookie Policy, and Discount Terms. If you wish to uninstall SpyHunter, learn how.

For payment on the automatic renewal of your subscription, an email reminder will be sent to the email address you provided when you registered before each payment date. At the onset of your trial, you will receive an activation code that is limited to use for only one Trial and for only one device per account. Your subscription will automatically renew at the price and for the subscription period in accordance with the offering materials and registration/purchase page terms (which are incorporated herein by reference; pricing may vary by country or promotion per purchase page details), provided that you are a continuous, uninterrupted subscription user. For paid subscription users, if you cancel, you will continue to have access to your product(s) until the end of your paid subscription period. If you wish to receive a refund for your then current subscription period, you must cancel and apply for a refund within 30 days of your most recent purchase, and you will immediately stop receiving full functionality when your refund is processed.

For CALIFORNIA CONSUMERS, please see the notice provisions:

NOTICE TO CALIFORNIA CONSUMERS: Per the California Automatic Renewal Law, you may cancel a subscription as follows:

  1. Go to www.enigmasoftware.com and click the "Login" button at the top right corner.
  2. Log in with your username and password.
  3. In the navigation menu, go to "Order/Licenses." Next to your order/license, a button is available to cancel your subscription if applicable. Note: If you have multiple orders/products, you will need to cancel them on an individual basis.

Should you have any questions or problems, you can contact our EnigmaSoft support team by phone at +1 (888) 360-0646 (USA Toll-Free) / +353 76 680 3523 (Ireland/International) or by email at support@enigmasoftware.com.

How do you cancel a SpyHunter Trial? Users should contact EnigmaSoft Limited directly to cancel a SpyHunter Trial. Users can contact our technical support team by emailing support@enigmasoftware.com, opening a ticket in the SpyHunter HelpDesk, or calling +1 (888) 360-0646 (USA) / +353 76 680 3523 (Ireland/International). You can access the SpyHunter HelpDesk from SpyHunter's main screen. To open a support ticket, click on the "HelpDesk" icon. In the window that appears, click the "New Ticket" tab. Fill out the form and click the "Submit" button. If you are unsure of what "Problem Type" to select, please choose the "General Questions" option. Our support agents will promptly process your request and respond to you.

------

SpyHunter Purchase Details

You also have the choice of subscribing to SpyHunter immediately for full functionality, including malware removal and access to our support department via our HelpDesk, typically starting at $42 for 3 months (SpyHunter Basic Windows) and $42 for 3 months (SpyHunter for Mac) in accordance with the offering materials and registration/purchase page terms (which are incorporated herein by reference; pricing may vary by country or promotion per purchase page details). Your subscription will automatically renew at the then applicable standard subscription fee in effect at the time of your original purchase subscription and for the same subscription time period or as set forth in the promotion materials/purchase page, provided you’re a continuous, uninterrupted subscription user and for which you will receive a notice of upcoming charges before the expiration of your subscription. Purchase of SpyHunter is subject to the terms and conditions on the purchase page, EULA/TOS, Privacy/Cookie Policy and Discount Terms.

------

General Terms

Any purchase for SpyHunter under a discounted price is valid for the offered discounted subscription term. After that, the then applicable standard pricing will apply for automatic renewals and/or future purchases. Pricing is subject to change, although we will notify you in advance of price changes.

All SpyHunter versions are subject to your agreeing to our EULA/TOS, Privacy/Cookie Policy, and Discount Terms. Please also see our FAQs and Threat Assessment Criteria. If you wish to uninstall SpyHunter, learn how.

Spywareremove.com uses cookies to provide you with a better browsing experience and analyze how users navigate and utilize the Site. By using this Site or clicking on "OK", you consent to the use of cookies. Learn more.