Threat Database Ransomware Hucky Ransomware

Hucky Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 2
First Seen: October 26, 2016
Last Seen: February 6, 2020
OS(es) Affected: Windows

The Hucky Ransomware is a variant of the Locky Ransomware. In fact, the Hucky Ransomware is nearly identical to this well-known ransomware Trojan, even having a name that is very similar. The Hucky Ransomware carries out an attack that is identical to Locky, as well as having a ransom note that nearly identical. There are countless variants of the Locky Ransomware, which include the Hucky Ransomware. However, in the last month, October of 2016, several new Locky variants have appeared in the wild. This may be due to a con artist group starting to use Locky variants in their attacks, the implementation of a yet unknown RaaS (Ransomware as a Service), or another unknown possibility. Like Locky and other variants of this ransomware Trojan, the Hucky Ransomware will encrypt the victim's files, replacing their extension with '.locky,' and demanding that the victim pays a substantial ransom to receive the decryption key necessary to recover the affected files.

How the Hucky Ransomware and Other Locky Ransomware Variants may Infect Your Computer

The Hucky Ransomware is being distributed through corrupted email attachments. These corrupted email attachments, commonly delivered through email spam, may use subject lines designed to trick inexperienced computer users into opening the message. The subject line may make it seem as if the message contains a receipt or invoice to trick the victim into opening it. The attachment may be a script that will download and install the Hucky Ransomware on the victim's computer. Once the Hucky Ransomware is installed, it will scan the victim's computer in search for certain file types and encrypt them using a strong encryption algorithm. The following file extensions are targeted in the Hucky Ransomware attack:

.sql, .mp4, .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps, .docm, .docx, .doc, .odb, .odc, .odm, .odp, .ods, .odt.

After encrypting all files matching the extensions in the list above, the Hucky Ransomware will drop ransom notes in the form of image, text, and HTML files on the victim's computer.

Dealing with a Hucky Ransomware Infection

Unfortunately, there is currently no decryption utility to help computer users that have been affected by a Locky variant like the Hucky Ransomware. However, it is not recommended to pay the Hucky Ransomware's ransom. This is because there is no guarantee that the con artists responsible for the Hucky Ransomware attack will help computer users recover by providing the decryption key after the payment is carried out. It is equally likely that the con artists will ask for more money or ignore the victim entirely. To deal with a the Hucky Ransomware infection, PC security researchers recommend that computer users wipe the affected hard drive or disinfect it thoroughly and the files that were encrypted be restored from a backup. This is why having backups of all files and keeping those backups regularly updated is the single best preventive measure to protect computer users from ransomware Trojans like the Hucky Ransomware.

Trending

Most Viewed

Loading...