Malware News Microsoft Warns of ZCryptor Ransomware with Self-Propagation Features

A

Alkajak

Thread author
microsoft-warns-of-zcryptor-ransomware-with-self-propagation-features-504566-2.png


Microsoft has released an alert today warning about a new ransomware variant called ZCryptor, which comes with the ability to self-propagate via removable and network drives.

A security researcher named Jack, behind the MalwareForMe blog, first discovered and wrote about this threat on May 24. Three days later, Microsoft 's security team also took note of the new wave of infections.

“We are alerting Windows users of a new type of ransomware that exhibits worm-like behavior,” Microsoft's Malware Protection Center alert reads. “This ransom leverages removable and network drives to propagate itself and affect more users.”

ZCryptor spread via macro malware and fake Flash updaters
The company says that crooks use fake installers, usually for Adobe Flash, along with macro-based booby-trapped Office files to distribute the Zcryptor ransomware.

Once the user installs the fake Adobe Flash update or allows an Office file to run macros, the Zcryptor ransomware is installed on the user's computer.

The first thing the ransomware does is to gain PC restart persistence by adding a key to the computer's registry. After this, it starts to encrypt files.

Based on samples it analyzed, Microsoft reported the ransomware was targeting 88 different file types. The security researcher MalwareHunterTeam told Softpedia that, in samples he analyzed, he saw the ransomware targeted 121 different file types, so it appears that ZCryptor's authors are still working and adding new code.

ZCryptor can apparently copy itself to removable and network drives
The most peculiar thing, the one that caught our attention, was Microsoft saying the ransomware has "worm-like behavior," meaning it can spread by itself to nearby targets.

Such behavior is novel for ransomware families, and it appears that this is one of the first ransomware variants to feature such a function. MalwareHunterTeam also said "that it [ZCryptor] has the codes to copy itself to removable devices."

A subsequent analysis by Trend Micro, also released today, has reinforced Microsoft's findings, categorizing the threat as a "worm," with self-propagation features.

Previously, the Alpha Ransomware was capable of searching and then encrypting files found on shared folders, but not to self-replicate on other drives.

Just like in the world of legitimate software development, crooks constantly upgrade their code and add new features, and we may see the first versions of ransomware capable of going after users on its own.

Below is the standard lock screen seen by victims that were infected with the ZCryptor ransomware. Because the ransomware adds the .zcrypt file extension to locked files, some researchers also call it zCrypt.

Full Article: Microsoft Warns of ZCryptor Ransomware with Self-Propagation Features
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Another deadly ransomware since other does not have a fully functional propagation feature, so of course you don't need to mess anything during your testing of this sample. ;)
 
  • Like
Reactions: Der.Reisende

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top