Threat Database Ransomware CryptoBit Ransomware

CryptoBit Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 1
First Seen: April 22, 2016
Last Seen: November 2, 2020
OS(es) Affected: Windows

The CryptoBit Ransomware is a ransomware Trojan that is designed to take victims' files hostage and demand the payment of a ransom. The CryptoBit Ransomware should not be confused with the CryptorBit Ransomware, which was active in 2014. The good news regarding the CryptoBit Ransomware is that it is entirely possible that the files encrypted using the CryptoBit Ransomware could be decrypted without the decryption key. However, as with most ransomware Trojans, the best solution is to be disciplined in backing up all files so that one can recover from an attack by wiping the hard drive and restoring the encrypted files with their backups. It appears that PC security researchers are still working to reverse engineer the CryptoBit Ransomware to uncover a way to decrypt these files. Fortunately, it seems that the threat contains various weaknesses that could be exploited by threat researchers.

How the CryptoBit Ransomware Infection Process Works

The CryptoBit Ransomware may spread mainly through the use of exploit kits. These components will attempt to exploit vulnerabilities on the victim's computers to execute the CryptoBit Ransomware's corrupted code remotely. They may be contained on websites that have been compromised, or the CryptoBit Ransomware may force computer users to visit the domain hosting the exploit kit through the use of redirect scripts or another threat. The first CryptoBit Ransomware infections started to appear in early April of 2016. PC security researchers that have observed the CryptoBit Ransomware infection process have noted that this ransomware Trojan has certain unique features when compared to other types of ransomware Trojans.

After the CryptoBit Ransomware has infected a computer, the CryptoBit Ransomware will scan the victim's hard drives in search for files with certain extensions. The CryptoBit Ransomware looks for 96 file extensions, particularly looking for databases, archives, documents and media files. Once the CryptoBit Ransomware completes its scan, it uses both the AES and RSA encryptions to encrypt the victim's files and then encrypt the decryption key, which is sent to a remote server. The CryptoBit Ransomware displays a ransom note on the victim's computer, alerting them that the files were encrypted and demanding the payment of a ransom. The CryptoBit Ransomware claims that it is necessary to contact the threat's author on the BitMessage network with a special ID.

The CryptoBit Ransomware Demands an Extraordinarily High Ransom from Its Victims

Compared to similar ransomware Trojans, the CryptoBit Ransomware demands a very high payment. Most threats ask for an amount somewhere between 0.5 and 1 BitCoin ($215 to $425 USD at the current exchange rate). On the other hand, the CryptoBit Ransomware demands the payment of 2 BitCoins! ($850 USD). Fortunately, PC security researchers have observed a flaw in the CryptoBit Ransomware's code. It seems that the CryptoBit Ransomware uses a custom operation of the RSA encryption that would allow PC security researchers to recover the original AES encryption file used by the CryptoBit Ransomware to encrypt the victim's data.

Preventing the CryptoBit Ransomware Attacks

The best protection from the CryptoBit Ransomware attacks and similar ransomware Trojans is prevention. This is because of the way they operate. Since the CryptoBit Ransomware and other ransomware Trojans encrypt the victim's files, removing the threat itself is not enough – the victim's files remain encrypted even after the Trojan is gone. Because of this, the best approach is to ensure that the files can be recovered if they become encrypted. PC security researchers recommend that computer users backup their files using a reliable back-up method on an external memory device or the cloud. Paying the CryptoBit Ransomware's ransom is never a good idea; computer users have no guarantee that these people will follow through on their promise, and restore the infected files; therefore, paying the ransom also may finance further threats. PC users also should ensure that their computers don't allow the CryptoBit Ransomware and similar threats in through the use of real-time anti-malware protection, safe Web browsing and email management practices.

Trending

Most Viewed

Loading...