Threat Database Ransomware Foxy Ransomware

Foxy Ransomware

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 3
First Seen: January 25, 2019
Last Seen: December 3, 2022
OS(es) Affected: Windows

The Foxy Ransomware is an encryption ransomware Trojan that was first observed on November 8, 2017. The Foxy Ransomware, like most other encryption ransomware Trojans, is designed to take the victims' files hostage by enciphering them with a strong encryption algorithm and then demanding the payment of a ransom in exchange for the decryption key. The Foxy Ransomware and similar threats may be delivered using corrupted email attachments. These email attachments may take the form of Microsoft Word documents with bad macro scripts that download and install the Foxy Ransomware onto the victim's computer. The Foxy Ransomware seems to be based on HiddenTear, an open source ransomware family that has been responsible for countless infections since its initial release in August 2015. The Foxy Ransomware is nearly identical to a variety of ransomware Trojans released within a short time between each other, which may mean that the Foxy Ransomware is part of a new RaaS (Ransomware as a Service) or a wave of ransomware attacks.

How the Foxy Ransomware’s Infection Works

The Foxy Ransomware uses the AES 256 encryption to make the victim's files unusable, targeting the user-generated files such as media files and files associated with commonly used software. The Foxy Ransomware will often run as 'WindowsSoundDriver.exe' or 'Foxy - Rnsmwre.exe' on the infected computer's Task Manager. The Foxy Ransomware scans the victim's computer for eligible files for the attack, avoiding the Windows system files (so that the victim's computer is still functional enough to deliver a ransom note and enable payment). The Foxy Ransomware marks the encrypted files by adding the file extension '.nightmare' to the end of each file's name. The following are some of the file types that may be encrypted during a Foxy Ransomware infection:

.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip.

How the Cybercrooks can Profit from the Foxy Ransomware and Similar Threats

Threats like the Foxy Ransomware function by delivering a ransom note to the victim demanding payment of a ransom. In the case of the Foxy Ransomware, this threat delivers a program window named 'Foxy – Ransomware' on the victim's computer. The Foxy Ransomware's ransom note has the following text:

'1.) What happened to my PC/Files?
- Your files has been encrypted, that means, they are useless to you.
2.) Can I recover my Files?
- Of course. Just pay the price shown below, to the also shown below, Bitcoin Address and after we received the Payment you get the decryption key.
[48 HOURS COUNDOWN TIMER]
If the Countdown is finished, all your files get deleted
Pay Fast, get safe!
[Do Payment|BUTTON]
[Decrypt Files|BUTTON]'

Unfortunately, the files that have been encrypted by the Foxy Ransomware cannot be decrypted without the decryption key that its perpetrators hold in their possession. However, computer users must refrain from paying the Foxy Ransomware ransom or contacting these people. It is very unlikely that they will help computer users restore their files, and paying the Foxy Ransomware ransom allows them to continue financing their activities and creating new threats like the Foxy Ransomware. Instead of paying the ransom, computer users should take preventive measures, mainly having file backups on a portable memory device or the cloud. File backups enable computer users to restore their files after removing the Foxy Ransomware with the help of an effective security program.

URLs

Foxy Ransomware may call the following URLs:

news-cezimu.cc

Related Posts

Trending

Most Viewed

Loading...