Threat Database Ransomware Wooly Ransomware

Wooly Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Ranking: 7,569
Threat Level: 100 % (High)
Infected Computers: 675
First Seen: August 29, 2017
Last Seen: September 17, 2023
OS(es) Affected: Windows

PC security researchers first observed the Wooly Ransomware in August 2017. The Wooly Ransomware carries out a basic encryption ransomware attack, targeting the victim's files and encrypting them with a strong encryption algorithm to demand the payment of a ransom. The Wooly Ransomware seems related to the Kuntzware Ransomware Trojan, which is nearly identical to this Trojans except for the usage of a different set of Command and Control servers. It is likely that the Wooly Ransomware is still unfinished since several aspects of this threat seem still under development.

How the Wooly Ransomware Infects a Computer

Analyzing the Wooly Ransomware's code, it seems that the Wooly Ransomware is designed to use the AES 256 encryption so that the victim's data become unusable. However, it seems that the Wooly Ransomware's network communication and decryption components are not finished. At this time, one is not capable of knowing what the complete version of the Wooly Ransomware might look like. However, the Wooly Ransomware is capable of encrypting the victim's files, making it a threat to the victim's data. The Wooly Ransomware is capable of applying its encryption components to the following file types:

.3gp, .7z, .apk, .avi, .bmp, .cdr, .cer, .chm, .conf, .css, .csv, .dat, .db, .dbf, .djvu, .dbx, .docm, ,doc, .epub, .docx .fb2, .flv, .gif, .gz, .iso .ibooks,.jpeg, .jpg, .key, .mdb .md2, .mdf, .mht, .mobi .mhtm, .mkv, .mov, .mp3, .mp4, .mpg .mpeg, .pict, .pdf, .pps, .pkg, .png, .ppt .pptx, .ppsx, .psd, .rar, .rtf, .scr, .swf, .sav, .tiff, .tif, .tbl, .torrent, .txt, .vsd, .wmv, .xls, .xlsx, .xps, .xml, .ckp, .zip, .java, .py, .asm, .c, .cpp, .cs, .js, .php, .dacpac, .rbw, .rb, .mrg, .dcx, .db3, .sql, .sqlite3, .sqlite, .sqlitedb, .psd, .psp, .pdb, .dxf, .dwg, .drw, .casb, .ccp, .cal, .cmx, .cr2.

The Wooly Ransomware will rename the files encrypted by its attack. The Wooly Ransomware will add the file extension '.wooly' to the end of the file's name. It is possible that as the Wooly Ransomware is further developed, new file markers or other features may be added to the Wooly Ransomware attack.

The Wooly Ransomware’s Similarities with the Kuntzware Ransomware

Although the Wooly Ransomware is unfinished, there are ways to predict where it might be developed due to its similarities with Kuntzware. One aspect of Kuntzware that was unique, and that may be implemented in the Wooly Ransomware, is the inclusion of a script that searches for file backups and data synchronized on the cloud specifically. The best you can do against ransomware Trojans is to have file backups on external memory devices or the cloud. Threats like the Wooly Ransomware may react to this protection by using scripts that try to compromise backed up data specifically. However, it is still impossible to know how the Wooly Ransomware will be developed since it still under development currently. The amount and characteristics of the Wooly Ransomware's possible ransom demands still also are unknown.

Protecting Your Computer from the Wooly Ransomware and Similar Threats

File backups are the best protection against any ransomware. However, not every backup method will be effective against the Wooly Ransomware and similar threats. It is necessary to ensure that the file backups on the cloud are not synced. Otherwise, the Wooly Ransomware may target directories that are synced with free cloud services such as Dropbox and Google Drive, also encrypting the backups stored in the cloud. To make the backups untouchable, make sure that they are not synced and use password protection to block them from being accessed by the Wooly Ransomware. Additionally, an external memory device such as an external hard drive apart from the victim's PC is probably the best way to ensure that your data is protected against threats like the Wooly Ransomware. These file backups are inexpensive and invaluable after a threat attack since they remove any power the extortionists have over their victims during a ransomware Trojan infection.

Trending

Most Viewed

Loading...