XData Ransomware
Posted: May 22, 2017
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 5 |
First Seen: | May 21, 2017 |
---|---|
OS(es) Affected: | Windows |
The XData Ransomware is a Trojan that can lock your files through an AES-based cipher, which it uses to hold the media up for ransom. Victims should resort to data unlocking strategies not requiring paying a fee to a con artist who may not honor any agreement, and storing backups on other devices can limit this Trojan's capacity for causing damage steeply. Other means of protecting your PC include using standard anti-malware products for identifying and deleting the XData Ransomware during any installation exploit.
The New 'X' Mark that's Crisscrossing Your File Data
Another Trojan campaign specialized in threatening, non-consensual encryption is under investigation in late May, with a sharp uptick in verifiable attacks in the nineteenth. While the Trojan in question, the XData Ransomware, uses English for relaying its extortion demands, many target systems are of either Ukrainian or Russian nationality. The Trojan's payload doesn't deviate majorly from those of past attacks of the same classification, and malware experts are rating it as a potential threat to PC users regardless of their living region or language.
The XData Ransomware's threat actors may carry out the installation of their Trojan through such means as forged e-mail content or exploit kits that they seed onto compromised domains. When it installs itself, the XData Ransomware doesn't initiate any features to distract or alarm the user, and, instead, begins running a background process that encrypts the files matching the target formats silently. The data malware experts are certain are under attack include PDF, DOC, XLS, and JPG, making the XData Ransomware a danger to media primarily.
One of the Trojan's last actions places a Notepad file on your desktop that carries the threat actor's ransoming instructions. Instead of providing the decryptor and withholding the key, as many con artists prefer, the XData Ransomware offers the decryption key for free and gives contact information for buying the decryption application. The extortionists are, as always, free to refuse to help at any point in the process, including after you pay any ransom they request.
Removing the Mark of a Trojan
The XData Ransomware doesn't display any pop-ups or other alerts while it encrypts your local content, and its most visible symptom is the series of '.~xdata~' extensions it adds after the file names. Due to the difficulty of identifying the threat before it finishes locking its targets, malware experts recommend using passive anti-malware features that may detect any threat to your PC automatically. Infection vectors more likely than not to be abused in the XData Ransomware's campaign include corrupted Web-browsing scripted content and compromised documents that often attach themselves to spam e-mails.
Although a user mindful of secure Web-browsing protocols should prevent many infections, some attacks also may occur without fault from the victim, such as drive-by-downloads using zero-day exploits. Malware experts encourage backing up your drive to a secondary one that's disconnected from the primary, which eliminates any possibility the XData Ransomware might have for encrypting or deleting it. Without such a backup, only having automatic anti-malware protection for removing the XData Ransomware can prevent any long-term encryption damage definitively.
Previously, Russia has been a moderate 'safe space' for users worried about threatening software, but the XData Ransomware shows that that landscape is changing. What nation you live in is providing less protection than ever against attacks as simple as data encryption and accompanying extortion increasingly.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:file.exe
File name: file.exeSize: 944.12 KB (944128 bytes)
MD5: c6a2fb56239614924e2ab3341b1fbba5
Detection count: 28
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 21, 2017
%APPDATA%\mssql.exe
File name: mssql.exeSize: 68.6 KB (68608 bytes)
MD5: a0a7022caa8bd8761d6722fe3172c0af
Detection count: 5
File type: Executable File
Mime Type: unknown/exe
Path: %APPDATA%
Group: Malware file
Last Updated: May 21, 2017
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.