Cerber 4.0 Ransomware Description
The Cerber 4.0 Ransomware represents the next generation in development of the '.cerber' line of encryption Trojans. The Cerber 4.0 Ransomware joins other threats like the ORX-Locker and the Stampado Ransomware, which are offered as Ransomware-as-a-Service package. The RaaS business was pioneered by Encryptor RaaS in early 2015 and the developers of Cerber want a share of the market for ransomware. It appears that the coders behind the Cerber 4.0 Ransomware decided to open their product to foreign programmers and benefit from the expanded distribution network.
A New JS Loader, New Obfuscation Layers, Customizable Encryption Engine and More
The Cerber 4.0 Ransomware is said to boast several significant improvements compared to the Cerber v3. The Cerber v4 creates a unique file extension marker for every victim, and the Trojan is programmed to bypass all security mechanisms employed by modern AV products. An updated encryption engine is combined with new layers of obfuscation and a JS loader to ensure a hassle-free operation of the Cerber 4.0 Ransomware. The makers of the Cerber v4 offer several strands of their threat for distribution to potential customers. Researchers note that the new Cerber Trojan shifted from a TXT-based ransom note to an HTA format that offers extended functionality and customization. Cyber crooks that wish to deploy their brand of ransomware are welcomed to buy the original Cerber engine and add a personal touch. You can find an example of the new ransom message below:
Can't you find the necessary files?
Is the content of your files not readable?
It is normal because the files' names and the data in your files have been encrypted by "Cerber Ransomware".
It means your files are NOT damaged! Your files are modified only. This modification is reversible.
From now it is not possible to use your files until they will be decrypted.
The only way to decrypt your files safely is to buy the special decryption software "Cerber Decryptor".
Any attempts to restore your files with the third-party software will be fatal for your files!
You can proceed with purchasing of the decryption software at your personal page:
[links to pages on the TOR Network]
If this page cannot be opened click here to generate a new address to your personal page. '
A Upgraded Distribution Network for the Cerber V4
The Cerber 4.0 Ransomware is deployed to users via spam emails loaded with macro-enabled documents and malvertising. Reports from several AV vendors and Web filtering services reveal that the Cerber 4.0 Ransomware is delivered to users via unsafe advertisements on compromised sites, casino-themed gaming portals, and pages with adult-rated content. In most cases, the RIG Exploit Kit is used to inject the Cerber v4 into vulnerable systems with outdated software and bad port configuration. The RIG EK gained popularity while spreading other threats including the CrypMIC Ransomware and switched to Cerber on October 1st 2016. We should add another exploit kit to the tools used to spread the Cerber 4.0 Ransomware, which is Neutrino. The Neutrino EK became quite popular thanks to a success in deploying the CryptXXX Ransomware.
Computer users can protect their OSes from variants of the Cerber 4.0 Ransomware by creating backups regularly and keeping their software up-to-date. Using an ad-blocker may limit the attack surface for the cyber crooks that utilize malvertising to spread the Cerber v4 as well. However, your first line of defense should be a trusted anti-malware shield that can filter your connection to the Internet and prevent ransomware from loading in Windows.
Infected with Cerber 4.0 Ransomware? Scan Your PCDownload SpyHunter's Spyware Scanner
to Detect Cerber 4.0 Ransomware * SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.
Security Doesn't Let You Download SpyHunter or Access the Internet?
Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
If you still can't install SpyHunter? View other possible causes of installation issues.
File System Details
|#||File Name||Size||MD5||Detection Count|