SERVER Cryptomix Ransomware
Posted: January 5, 2018
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 8/10 |
---|---|
Infected PCs: | 58 |
First Seen: | April 28, 2023 |
---|---|
OS(es) Affected: | Windows |
The SERVER Cryptomix Ransomware is a variant of the CryptMix Ransomware, a Trojan family that locks files so that it can ask for ransoms for reversing the attack. Since the file-locking feature uses an encryption routine that may be permanent, victims should back up their data to keep it protected from this threat. Malware experts also encourage having anti-malware software available for deleting the SERVER Cryptomix Ransomware before it can start blocking any of your data.
A Server Full of Trojan Troubles
A supplement to the days' old, last version of the CryptMix Ransomware, the Tastylock Ransomware, is already appearing and circulating with different cosmetic and ransom-based details for its payload. The new threat, the SERVER Cryptomix Ransomware is also from the CryptMix Ransomware's Revenge Ransomware branch and uses the same file-locking method of the AES encryption in CBC mode. Since malware researchers are rating this family's encryption as being secure currently, the SERVER Cryptomix Ransomware's attack may lock you out of your files indefinitely.
The SERVER Cryptomix Ransomware attacks content such as PDF documents, GIF images, ZIP archives, and other media, using its encryption algorithm to encode each file and make it unreadable. Unlike most versions of its family, such as the Zayka Ransomware or the Exte Ransomware, the SERVER Cryptomix Ransomware also overwrites the names of the files with its own, semi-random string of characters (such as '0D0A516824060636C21EC8BC280FEA12'). It gives this string the '.SERVER' extension, which replaces any preexisting ones.
The other changes in the SERVER Cryptomix Ransomware that malware experts are pinpointing all focus on its ransom note, which is using different e-mail addresses for negotiating. Although the threat actors encourage contacting them and paying for recovery, any users affected by the SERVER Cryptomix Ransomware should note that buying decryption solutions can backfire due to the explicit avoidance of traditional refunding protections.
Serving Your PC a Helping of Safety
The SERVER Cryptomix Ransomware represents more than just an immediate danger to the media on an infected Windows system ultimately. The SERVER Cryptomix Ransomware also conducts security-disabling attacks that may leave the PC vulnerable to the efforts of additional threats. The Trojan disables features like Windows Defender, the Background Intelligent Transfer Service, Automatic Repair, and general startup alerts. It also removes default, Windows backups to keep any hostage media as secure from recovery as possible.
Established infection vectors for threats of the SERVER Cryptomix Ransomware's type include spam e-mails and brute-force compromises of network logins, with the former using misinformed consent from the victim and the latter using manual installations. Users can rotate unique, complex passwords to keep their servers protected from brute-force hacking methods relatively. Traditional anti-malware programs also can delete the SERVER Cryptomix Ransomware either during its infection efforts or after it succeeds in compromising the PC.
The SERVER Cryptomix Ransomware offers yet another danger to PC users, ones maintaining server machines, who don't keep a close eye on their network security or backup practices particularly. The CryptMix Ransomware is making a fast start in activity for 2018, and may even overtake widespread families like Hidden Tear, over time.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.