StorageCrypter Ransomware
Posted: November 28, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 1/10 |
---|---|
Infected PCs: | 108 |
First Seen: | February 14, 2022 |
---|---|
Last Seen: | April 27, 2023 |
OS(es) Affected: | Windows |
The StorageCrypter Ransomware is a Trojan that blocks your files until you agree to pay a ransom to its threat actor for restoring them. Exceptionally for a threat of its classification, the StorageCrypter Ransomware also includes support for locking media on some forms of network-accessible devices, including some cloud services. Always protect your network-based backups with appropriate password management and use a high-quality anti-malware program for uninstalling the StorageCrypter Ransomware as soon as possible.
The Cloud's Forecast is a Storm of Ransoms
One of the recurring mantras of defending your PC from threatening software is the importance of having a secure backup of your work, but what constitutes 'secure' isn't perfectly consistent. While most of the file-locking threats that malware experts are aware of are specializing in damaging the contents of local drives, a minority of these Trojans can extend their attacks further than usual. In extreme situations, such as with the payload of the StorageCrypter Ransomware, the intended loss of data even can affect network storage, AKA 'the cloud.'
Cloud-based features have been in differing usage by different Trojan campaigns, such as the notable abuses of the Mischa Ransomware, which leveraged its features for compromising an entire network from a single installation. Although the StorageCrypter Ransomware's cloud-based attacks aren't as comprehensive necessarily, the StorageCrypter Ransomware does support causing encryption-based damage to both the user's local files and network-accessible ones, including some types of cloud services. The enciphering routine appears to be AES and RSA-based, and malware experts are estimating that a free decryption for the StorageCrypter Ransomware may be unavailable for the indefinite future.
After using the above feature to 'lock' different formats of files and keep the user from opening them, the StorageCrypter Ransomware creates a Notepad message asking the user for Bitcoins to buy its ill-endorsed decryption service. The 0.4 Bitcoin rate converts to nearly four thousand USD and raises the chances of the StorageCrypter Ransomware campaign aiming for business or government sector systems that store highly valuable data significantly.
Ensuring that Your Storage is Trojan-Free
Since the StorageCrypter Ransomware is showing no case of built-in features for compromising login credentials, protecting your cloud services with secure password management may help prevent this Trojan from accessing your backups. Malware experts also recommend using discrete or portable drives that can avoid exposure to any potentially compromised networks, by default. Paying the ransom the StorageCrypter Ransomware requests may or may not give a solution to the victim, and the use of Bitcoins guarantees that the threat actor will suffer no repercussions, regardless of his actions.
Cybercrooks sometimes choose to attack manually a business or government-related network that could hold media that's worth ransoming. Along with, again, emphasizing password management, malware experts also can encourage examining e-mail messages for suspicious attachments and disabling content that has a high risk of being exploited, such as document-based macros and Web-browser scripts. Uninstalling the StorageCrypter Ransomware should include a comprehensive system scan with appropriate anti-malware tools that also could account for the risk of the same threat actor dropping multiple threats onto one computer.
A 'safe harbor' for your files is a slowly but constantly-shifting definition. When thew cybercrooks put in more effort, such as with the StorageCrypter Ransomware's cloud features, users will need to up the ante in kind by improving their network security.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.