Threat Database Ransomware Cukiesi Ransomware

Cukiesi Ransomware

The Cukiesi Ransomware is a file-locking Trojan that's part of the TeslaCrypt family. It can block the user's media files and hold them hostage with its encryption routine. Windows users should recover any files through free options instead of surrendering to its ransom demands while keeping anti-malware products available to remove the Cukiesi Ransomware infections.

A Traveling Series of Data-Searing Sparks

The TeslaCrypt family is a collective of file-locking Trojans that many cyber-security industry entities once proclaimed equivalent to dead. 2021 shows that the estimate is far from the case, with new versions like the 0l0lqq Ransomware and February's Cukiesi Ransomware backing up the old 'ReCoVeRy+[RANDOM LETTERS] File Extension' Ransomware, the '.mp3 File Extension' Ransomware and the '.exx File Extension' Ransomware. As the newest version, the Cukiesi Ransomware continues proving that this family is after far more than 'just' video gaming data.

Malware researchers point to the Cukiesi Ransomware's encrypting and locking most digital media formats, such as Excel spreadsheets, Word documents, and pictures like BMPs or GIFs, as part of its extortion scheme. The Trojan also adds a long extension with a 'cU' string, an ID, and the 'Cukiesi' string (of possible Turkish etymology) to the file's name. The Cukiesi Ransomware also can delete the Restore Points by wiping the user's Shadow Volume Copy data securely.

With these digital hostages, the Trojan concludes by generating a pop-up and creating a text message. Both carry the ransoming instructions with generic warnings and no prices, only e-mail addresses for contacting the attacker. Malware researchers can't confirm whether the Cukiesi Ransomware is compatible with current TeslaCrypt decryption freeware. Still, users should always create copies of their files before testing an encryption-reversing tool, regardless of its source.

Quenching the Electrical Vibrancy of Trojans' Businesses

The Cukiesi Ransomware's campaign, if it keeps to the standards of the 0l0lqq Ransomware, may use e-mail-circulating spreadsheets, crafted to appear as product orders from legitimate suppliers, for its installation tactic. However, this isn't the only possibility. Malware experts also connect versions of TeslaCrypt to other techniques and threats, such as the Avalanche Botnet (a dedicated threat-installing network).

Workers should avoid opening attachments and other downloads carelessly without scanning them for threats with compatible security applications. They also should remain alert to dangers like embedded macros and out-of-date software, which may facilitate drive-by-download exploits. Most users who practice safe Web-browsing behavior, update their software, and use strong passwords shouldn't be at much risk.

Users should have backups safe for recovering any files that this Trojan locks because of the questionable decryption prospects. An effective Windows anti-malware program also should block attacks and remove the Cukiesi Ransomware.

Like a zombie, TeslaCrypt keeps shambling forward even if many observers feel that it ought to lay down and die. The Cukiesi Ransomware is the latest surge that shows that even experts can't always predict what file-locking Trojans will do next.

Trending

Most Viewed

Loading...