Kimchenyn Ransomware

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 1
First Seen: January 28, 2022
Last Seen: January 28, 2022
OS(es) Affected: Windows

The Kimchenyn Ransomware is an encryption ransomware Trojan that belongs to the Globe Imposter 2.0 group of ransomware Trojans. The Kimchenyn Ransomware, along with other threats in this family, was observed in November 2017. The Kimchenyn Ransomware is being distributed through the use of corrupted spam email attachments. There is virtually nothing to differentiate the Kimchenyn Ransomware from the various other versions of this Trojan family that exist currently. The Kimchenyn Ransomware connects to its Command and Control servers and, as of the writing of this report, the threat actors responsible for the Kimchenyn Ransomware and its variants are unknown. It is clear that the Kimchenyn Ransomware is part of a larger campaign of ransomware Trojans and that the cybercrooks responsible for the Kimchenyn Ransomware and other Globe Imposter 2.0 variants have resources and knowledge of how to carry out these campaigns (as opposed to ransomware Trojans that are clearly the work of amateur coders).

The Kimchenyn Ransomware Prevents PC Users from Using Known Restore Methods

The Kimchenyn Ransomware spreads to victims mainly through the use of spam email messages that contain corrupted links or attachments. The Kimchenyn Ransomware will infect all versions of the Windows operating system that are in use commonly. The Kimchenyn Ransomware attack consists of using the AES 256 encryptions to make the victim's files inaccessible. The Kimchenyn Ransomware will also delete the Shadow Volume Copies of the files and other alternate restore methods. The purpose of this is to take the victim's files hostage. Once the Kimchenyn Ransomware has encrypted the victim's files, they will no longer be readable or recoverable. The Kimchenyn Ransomware will target the user-generated files, which can include images, texts, audio, videos, databases, and various other documents commonly associated with popular software. The file types that are targeted in these attacks include:

.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip.

Unfortunately, unless the victim has file backups, it is not possible to recover the affected files without the decryption key (which the cybercrooks hold in their possession.) However, the people responsible for the Kimchenyn Ransomware attack charge at least 600 USD for the decryption program necessary to recover the affected files. Don't pay the Kimchenyn Ransomware ransom amount unless there's no other way. This ransom amount is detailed in an HTML file named 'how_to_back_files.html' that is dropped on the infected computer. The victim is prompted to contact the cybercrooks by writing an email to an email address on an @india.com domain. It is very unlikely that the cybercrooks will help victims recover their files, and contacting the cybercrooks can lead to additional problems since the victim will be self-identified as willing to pay or negotiate.

Dealing with the Kimchenyn Ransomware and Protecting Your Data from Ransomware Trojans

Although a skilled security program with the removal of the Kimchenyn Ransomware can help computer users, a security software is incapable of restoring files encrypted by the Kimchenyn Ransomware attack currently. Because of this, the best protection against the Kimchenyn Ransomware and similar threats is to have backup copies of your files. Having backup copies removes any leverage the cybercrooks have that allows them to demand a ransom payment from their victims.

Trending

Most Viewed

Loading...