Threat Database Ransomware Cdxx Ransomware

Cdxx Ransomware

During the analysis of malware threats, researchers have identified a new ransomware strain known as Cdxx. This damaging software is categorized as ransomware, with its primary goal being the encryption of data on infected systems. Subsequently, victims are coerced into paying a ransom in exchange for the promised decryption of their files. Additionally, the Cdxx Ransomware exhibits the characteristic behavior of appending the '.cdxx' extension to filenames during the encryption process. For instance, a file originally named '1.doc' would be renamed to '1.doc.cdxx,' and '2.pdf' to '2.pdf.cdxx,' and so on. The ransomware further leaves a distinctive ransom note named '_readme.txt.'

It is crucial to note that the Cdxx Ransomware is identified as a variant within the STOP/Djvu malware family. Researchers emphasize that ransomware variants from this particular strain are frequently distributed in conjunction with information stealers such as RedLine and Vidar.

The Cdxx Ransomware Could Cause Significant Damage to Infected Systems

The Cdxx Ransomware's ransom note assures victims of the complete recovery of all files, encompassing pictures, databases, and crucial documents. The encryption of these files employs robust algorithms and a unique key, making restoration contingent on obtaining a specialized decryption tool and key.

Within the note, there is an offer of free decryption for one file, provided that the selected file does not contain valuable information. The stated ransom payment for acquiring the private key and decryption software is $1999. However, there is a supposed 50% discount available if the victim initiates contact within the first 72 hours, thereby reducing the price to $999.

Emphasizing the urgency of payment, the note warns that data restoration is deemed impossible without paying the ransom. To initiate the payment process and obtain the necessary tools, victims are directed to contact the email address (or

Despite the coercive nature of the ransom demands, information security researchers strongly advise victims against making any payments. The rationale behind this caution is the uncertainty associated with threat actors fulfilling their promise of providing decryption tools, even after payment.

Moreover, victims are urged to take immediate action to remove the ransomware from affected computers. This proactive measure serves to prevent potential additional encryptions and halts the spread of the threat within local networks. Swift action is deemed crucial in minimizing the overall impact and thwarting the ransomware's progression.

Don’t Take Chances with the Security of Your Devices and Data

To safeguard devices against ransomware infections, users should implement a combination of effective security measures. Here are five essential practices:

  • Regular Backups: Implement a robust and regular backup strategy for all important data. Backups should be stored in an offline or cloud-based location, ensuring that even if a device is compromised, data can be restored without succumbing to ransomware demands.
  •  Use Reliable Security Software: Install reputable anti-malware software on all devices. Keep the security software up to date and configured to perform real-time scanning. This helps detect and prevent ransomware threats before they can encrypt files.
  •  Maintain Updated Your Software and Operating Systems: Regularly update the operating system, software applications and anti-malware tools. Software updates are often utilized to deliver security patches that address vulnerabilities exploited by ransomware. Enabling automatic updates can streamline this process.
  •  Educate and Train Users: Educate users on secure online habits to minimize the risk of falling victim to social engineering and phishing attacks, because these are common entry points for ransomware. Encourage users to be cautious with email attachments, links, and downloads from untrusted sources.
  •  Network Security Measures: Implement strong network security measures, including firewalls and intrusion detection systems. Regularly monitor network traffic for any unusual or suspicious activities. Employing a Virtual Private Network (VPN) for secure Internet connections can add an extra layer of protection.

Additionally, it's worth mentioning that practicing good cyber hygiene involves not only preventive measures but also having a solid incident response plan in place. This plan should include steps to be taken in case of a ransomware attack, communication protocols, and procedures for isolating affected devices to prevent the spread of the infection.

Victims of the Cdxx Ransomware are left with the following ransom note:


Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted
with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $1999.
Discount 50% available if you contact us first 72 hours, that's price for you is $999.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:

Reserve e-mail address to contact us:

Your personal ID:'

Cdxx Ransomware Video

Tip: Turn your sound ON and watch the video in Full Screen mode.


Most Viewed