'Systemdown@india.com' Ransomware
Posted: August 24, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 5 |
First Seen: | August 24, 2016 |
---|---|
OS(es) Affected: | Windows |
The 'Systemdown@india.com' Ransomware is a variant of the Crysis Ransomware that locks your files with encryption attacks and loads messages asking for ransoms for their safe decryption. Con artists may not feel obligated to provide any services after taking their ransom money, and malware analysts recommend keeping backups to protect yourself against such incidents. Besides whatever choices you make in dealing with the hostage scenario, use your anti-malware products to remove the 'Systemdown@india.com' Ransomware and prevent it from continuing its attacks.
Taking Your System Down to Encryption Town
PC owners wanting to protect their PCs from threatening software now may be troubled by having insufficient time to track most new threats. Increasingly, threat authors are showing signs of preferring renting their software products to other remote attackers, who choose to configure custom variants of Trojans, such as the 'Systemdown@india.com' Ransomware. This Trojan most likely is based on the same code as the Crysis Ransomware, but, no matter what its origins may be, it can cause permanent losses of file data.
Although the 'Systemdown@india.com' Ransomware doesn't attack data related to the infected system's OS, it does target texts and other media, such as Word DOC documents or Excel's XLS spreadsheets. Besides inserting ID numbers, its e-mail contact and the '.xtbl' extension into each file's name, the 'Systemdown@india.com' Ransomware also leverages an encryption attack via AES and RSA algorithms. The attack stops the PC's owner from accessing any of his data, similarly to the campaigns of the 'Okean-1955@india.com' Ransomware, the 'Meldonii@india.com' Ransomware or the 'Payfornature@india.com' Ransomware.
Victims can expect visible symptoms in the form of ransom messages delivered through desktop wallpapers or Notepad TXT files. Under no circumstances can malware analysts recommend paying any fee to con artists whenever you haven't tested all alternative recovery methods.
Rising Over Simple Encryption Attacks
The 'Systemdown@india.com' Ransomware is not regional to India and seems to target English-speaking companies predominantly. Infection vectors could include e-mail content or, in less frequent cases, brute force attacks against easy remote desktop access or simple network passwords. PC owners should strive to protect their systems from the 'Systemdown@india.com' Ransomware before its attacks can conclude and hold their data hostage, both by avoiding the above infection methods and scanning all incoming content for threats.
The PC sector security has had limited success with decrypting the 'Systemdown@india.com' Ransomware and other variants of the Crysis Ransomware. Keep a backup on a password-protected server or a detached drive and update it regularly, which will give you a resource to overwrite any encrypted data. Due to the possibility of encryption attacks triggering repeatedly, malware experts do warn that you should remove the 'Systemdown@india.com' Ransomware through proper anti-malware solutions before introducing any new files to the system.
There is little new about the 'Systemdown@india.com' Ransomware to strike a sharp difference from other builds of this family. However, its use of reliable, proven technology does emphasize how PC owners will need to continue paying attention to all established security weaknesses favored by similar Trojan campaigns.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.