Threat Database Ransomware Pytehole Ransomware

Pytehole Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 3
First Seen: April 27, 2017
Last Seen: April 18, 2018
OS(es) Affected: Windows

The Pytehole Ransomware is a ransomware Trojan that was first uncovered on April 28, 2017. The Pytehole Ransomware is designed to affect computer users in English-speaking regions, although English is often used on the Internet even when targeting computer users in other parts of the world. The Pytehole Ransomware is being distributed using corrupted email attachments distributed using spam email messages mostly. The Pytehole Ransomware receives its name because the file used by this threat is named 'pyte-hole.exe' and seems to contain the Pytehole Ransomware's encryption engine. The Pytehole Ransomware can affect computers using both 32 and 64-bit versions of the Windows operating systems and represents a real threat to data placed on all local drives, removable memory devices connected to the connected device, and directories shared on the infected computer's network.

The Pytehole Ransomware Targets the Files Created by the Computer User Mainly

Unlike many ransomware Trojans that use Command and Control servers located on the Dark Web and away from the reach of most security specialists, the Pytehole Ransomware uses Command and Control servers on the open Web, which have allowed security researchers to respond fast to the attack. However, the Pytehole Ransomware does use an effective strategy in taking over the victims' data, with a fusion of the AES and RSA encryptions to make the victims' files ineffective. The files encrypted using the Pytehole Ransomware will be marked with the file extension '.adr,' making it easy to notice which files have been affected in the Pytehole Ransomware attack. This ransomware Trojan will target the files generated by the computer user, which includes PDF files, databases, spreadsheets, text files, media files, images, and a wide variety of files created by software such as Adobe Photoshop or AutoCAD. It seems that computer users cannot decrypt the files that have been affected by the Pytehole Ransomware deprived of the decryption key (which the con artists hold in their possession until the victim pays a ransom of 0.2 BitCoin, or about $237 USD).

Among the file types that the Pytehole Ransomware and similar ransomware Trojans will target are included the following:

.3dm, .3g2, .3gp, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .arw, .as, .as3, .asf, .asp, .asx, .avi, .bay, .bmp, .cdr, .cer, .class, .cpp, .cr2, .crt, .crw, .cs, .csv, .db, .dbf, .dcr, .der, .dng, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .dxg, .efx, .eps, .erf, .fla, .flv, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .kdc, .m3u, .m3u8, .m4u, .max, .mdb, .mdf, .mef, .mid, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .mrw, .msg, .nef, .nrw, .odb, .odc, .odm, .odp, .ods, .odt, .orf, .p12, .p7b, .p7c, .pdb, .pdf, .pef, .pem, .pfx, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .pst, .ptx, .r3d, .ra, .raf, .rar, .raw, .rb, .rtf, .rw2, .rwl, .sdf, .sldm, .sldx, .sql, .sr2, .srf, .srw, .svg, .swf, .tif, .vcf, .vob, .wav, .wb2, .wma, .wmv, .wpd, .wps, .x3f, .xla, .xlam, .xlk, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .zip.

Dealing with a Pytehole Ransomware Infection

PC security researchers do not advise computer users to pay the Pytehole Ransomware ransom, despite the fact that the files cannot be recovered without the decryption key. This is because the people responsible for these attacks may ignore the payment, demand additional payments or reinfect the victims' computers. Prevention is crucial to dealing with the Pytehole Ransomware and limiting the effect of these attacks. If computer users have backups of all their files on an external memory device or the cloud, then the people responsible for the Pytehole Ransomware attack lost any power they have over the victim that entitles them to demand a ransom payment. Apart from having file backups, a reliable security program that is fully up-to-date can be used to intercept the attack or remove the threat completely before restoring the files from a backup copy.

Trending

Most Viewed

Loading...