Home Malware Programs Ransomware XZZX Ransomware

XZZX Ransomware

Posted: November 14, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 33
First Seen: April 20, 2021
Last Seen: March 2, 2022
OS(es) Affected: Windows

The XZZX Ransomware is a member of the CryptMix Ransomware family (also identifiable as 'CryptoMix'). This Trojan uses embedded cryptography keys to encode and lock different file types, such as pictures or documents. Symptoms related to an infection include specific changes to the names of any unusable, digital media, as well as ransom-themed messages soliciting the victim to buy a decryptor. Use your anti-malware programs to delete the XZZX Ransomware proactively, when possible, and backups for recovering any files that this Trojan damages.

Mixing Up a New Edition of Trojans

November finally is seeing a new 'birth' in the CryptMix Ransomware family, which is notable for switching between offline and online cryptography attacks and conducting RaaS-based extortion campaigns. The new member, the XZZX Ransomware, is an offline variant and is suitable for holding data on a PC hostage without requiring any form of network connection, although it still requiring manual installation to the system. Although the XZZX Ransomware's changes are superficial predominantly, its activity is a reminder to readers that the CryptMix Ransomware family is both highly active and, potentially, flexible with its threat actors.

The XZZX Ransomware uses internal storage of its keys that allows the program to conduct RSA-secured, AES-based, file-locking attacks against arbitrary types of media. Commonplace targets of these attacks usually include text documents, byproducts of popular software like Adobe's PDF Reader or Microsoft's Office suite, images and archives. After locking all of this content, the XZZX Ransomware converts their names with Base64 (resulting in the appearance of semi-random numbers and letters), along with adding its '.XZZX' extension.

The XZZX Ransomware also generates a ransom message that the threat actors update from previous versions only for which e-mail addresses it uses. Like other CryptMix Ransomware versions, the XZZX Ransomware gives the victim an ID number for the process of 'buying' the decryption solution to unlocking their files. Victims pay this ransom at their own risk and may not be provided with the decryption key afterward.

Ending the Danger of the End of the Alphabet

Since the XZZX Ransomware's family may cycle through different threat actors arbitrarily, its installation exploits have the potential to be more flexible than those of most file-locking Trojans. Malware experts often see Trojans of the XZZX Ransomware's classification using spam e-mail attachments as favored delivery mechanisms, but manual attacks using RDP features or even fake, pirated media downloads also are possible vectors for an infection. Updating anti-malware solution to use their latest available databases for identifying new threats can help them detect inaccurate files that pose a threat to your computer.

The XZZX Ransomware's family has features intended for deleting local backups that the user could use to restore any 'locked' content. As a precaution against similar attacks, malware experts suggest always keeping a backup on a secure device, such as USB drives, DVDs or cloud services. Most modern iterations of the XZZX Ransomware's family, including the XZZX Ransomware, use secure encryption methods that aren't compatible with currently-available, public decryptors. However, anti-malware products always may remove the XZZX Ransomware immediately and minimize any file loss.

The CryptMix Ransomware family continues growing, and members like the XZZX Ransomware, the Coban Ransomware, and the Shark Ransomware represent a rotation of very similar threats to the most valuable files on your computer. Without an unexpected breakthrough in its RSA database by malware experts, the price of letting your backups grow disused might be everything on your hard drive.

Loading...