Jason Stitt - Fotolia

Jason Stitt - Fotolia

Q

What threat does the CrypVault ransomware attack pose?

While not very sophisticated, the CrypVault ransomware still poses a major enterprise threat. Expert Nick Lewis explains.

A new variant of ransomware is using the .vault extension to give the appearance that it's already been quarantined by an antimalware program. While worrisome, I've heard it isn't advanced. How does this malware work, and what threat does it pose?

While the new CrypVault malware is not overly sophisticated, it demonstrates how an attacker with modest resources can create an effective ransomware attack. It uses scripts and command-line utilities to assemble the entire attack. It also uses batch scripts to edit the registry and pull all the steps together: GNUGpg for the file encryption and Sdelete to securely delete the config files. The files encrypted with GNUGpg are saved with a .vault extension to further hide the files.

Renaming a file extension helps a ransomware attack bypass simple blacklists and makes it more difficult for users to understand what happened to the files, but is not a sufficient tactic to use to bypass current antimalware tools. If a security tool your enterprise relies on misses an infection because the malware file names do not match, you should quickly find a better tool to use.

The threat CrypVault poses to enterprises is the same as any other malware; it can execute on an endpoint and destroy files or cause other havoc. It also specifically seems to target Russian users, which limits the population the ransomware can successfully extort.

PRO+

Content

Find more PRO+ content and other member only offers, here.

Enterprises should have standard antimalware security controls in place to prevent and defend against malware like CrypVault, and should also ensure steps are taken to protect from other ransomware attacks, such as keeping good backups at all times.

Ask the Expert:
SearchSecurity expert Nick Lewis is ready to answer your enterprise threat questions -- submit them now. (All questions are anonymous.)

Next Steps

Stay secure from ransomware

Learn more about removing ransomware and dealing with advanced encryption algorithms

This was first published in October 2015

Dig Deeper on Malware, Viruses, Trojans and Spyware

Have a question for an expert?

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.
Related Discussions

Nick Lewis asks:

Is your enterprise worried about ransomware attacks?

1  Response So Far

Join the Discussion

0 comments

Oldest 
Send me notifications when other members comment.

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close