Cerber 4.0 Ransomware Description
The Cerber 4.0 Ransomware represents the next generation in development of the '.cerber' line of encryption Trojans. The Cerber 4.0 Ransomware joins other threats like the ORX-Locker and the Stampado Ransomware, which are offered as Ransomware-as-a-Service package. The RaaS business was pioneered by Encryptor RaaS in early 2015 and the developers of Cerber want a share of the market for ransomware. It appears that the coders behind the Cerber 4.0 Ransomware decided to open their product to foreign programmers and benefit from the expanded distribution network.
A New JS Loader, New Obfuscation Layers, Customizable Encryption Engine and More
The Cerber 4.0 Ransomware is said to boast several significant improvements compared to the Cerber v3. The Cerber v4 creates a unique file extension marker for every victim, and the Trojan is programmed to bypass all security mechanisms employed by modern AV products. An updated encryption engine is combined with new layers of obfuscation and a JS loader to ensure a hassle-free operation of the Cerber 4.0 Ransomware. The makers of the Cerber v4 offer several strands of their threat for distribution to potential customers. Researchers note that the new Cerber Trojan shifted from a TXT-based ransom note to an HTA format that offers extended functionality and customization. Cyber crooks that wish to deploy their brand of ransomware are welcomed to buy the original Cerber engine and add a personal touch. You can find an example of the new ransom message below:
Can't you find the necessary files?
Is the content of your files not readable?
It is normal because the files' names and the data in your files have been encrypted by "Cerber Ransomware".
It means your files are NOT damaged! Your files are modified only. This modification is reversible.
From now it is not possible to use your files until they will be decrypted.
The only way to decrypt your files safely is to buy the special decryption software "Cerber Decryptor".
Any attempts to restore your files with the third-party software will be fatal for your files!
You can proceed with purchasing of the decryption software at your personal page:
[links to pages on the TOR Network]
If this page cannot be opened click here to generate a new address to your personal page. '
A Upgraded Distribution Network for the Cerber V4
The Cerber 4.0 Ransomware is deployed to users via spam emails loaded with macro-enabled documents and malvertising. Reports from several AV vendors and Web filtering services reveal that the Cerber 4.0 Ransomware is delivered to users via unsafe advertisements on compromised sites, casino-themed gaming portals, and pages with adult-rated content. In most cases, the RIG Exploit Kit is used to inject the Cerber v4 into vulnerable systems with outdated software and bad port configuration. The RIG EK gained popularity while spreading other threats including the CrypMIC Ransomware and switched to Cerber on October 1st 2016. We should add another exploit kit to the tools used to spread the Cerber 4.0 Ransomware, which is Neutrino. The Neutrino EK became quite popular thanks to a success in deploying the CryptXXX Ransomware.
Computer users can protect their OSes from variants of the Cerber 4.0 Ransomware by creating backups regularly and keeping their software up-to-date. Using an ad-blocker may limit the attack surface for the cyber crooks that utilize malvertising to spread the Cerber v4 as well. However, your first line of defense should be a trusted anti-malware shield that can filter your connection to the Internet and prevent ransomware from loading in Windows.
File System Details
|#||File Name||Size||MD5||Detection Count|
|23||%SystemDrive%\Documents and Settings\STEVE\Application Data\_HELP_HELP_HELP_CKJ4GL.hta||75,787||99d3fc208d3623107cfb18a9069e23bd||1|
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.