Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


.CRYPTOSHIEL File Virus (Restore Files)

Article created to help you remove the latest CryptoShield ransomware using the .CRYPTOSHIEL file extension and restore files that have been encrypted by it.

A new version of the CryptoShield ransomware using the R_SUP@INDIA.COM e-mail has reappeared and has begun to infect users. Malware researchers believe that this version may be a bugged version released by the creators of the virus, but it may as well be completely new version. The virus is still believed to use AES encryption for the files render them no longer openable. It uses this to extort the victims to pay a hefty ransom fee to get the files back. In case you have become a victim of the CryptoShield ransomware infection, it is recommended to read this article.

Threat Summary

Name

.CRYPTOSHIEL Virus

Type Ransomware
Short Description The malware encrypts users files using a strong encryption algorithm, making direct decryption possible only via a unique decryption key available to the cyber-criminals.
Symptoms The user may witness ransom notes and “instructions” linking to a web page and a decryptor. Changed file names and the file-extension .CRYPTOSHIEL has been used.
Distribution Method Via an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by .CRYPTOSHIEL Virus

Download

Malware Removal Tool

User Experience Join our forum to Discuss .CRYPTOSHIEL Virus.
Data Recovery Tool Data Recovery Pro by ParetoLogic Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

CryptoShield Ransomware – How Does It Infect

The infection process of this iteration using the .CRYPTOSHIEL file extension is believed to be spread using the same RIG Exploit Kit v4.0 version. The exploit kit contains multiple different tools and methods that are being used to infect a computer system successfully. One very common method of replicating files this way is via e-mail spam. These files are cleverly disguised in order to fool the user they are legitimate documents, like the example below displays:

The files may be of multiple executable file types, like the following:

→ .exe, .bat, .cmd, .vbs, .hta, .htm, .html, .tmp.exe, .tmp ‘sys’,’shs’,’wmf’,’chm’,’wmf’,’ozd’,’ocx’,’aru’,’xtbl’,’bin’,’exe1′,’386′,’dev’,’xnxx’,’vexe’,’tps’,’pgm’,’php3,’hlp’,’vxd’,’buk’,’dxz’,’rsc_tmp’,’sop’,’wlpginstall’,’boo’,’bkd’,’tsa’,’cla’,’cih’,’kcd’,’s7p’,’smm’,’osa’,’exe_renamed’,’smtp’,’dom’,’vbx’,’hlw’,’dyz’,’rhk’,’fag’,’qrn’,’fnr’,’dlb’,’mfu’,’xir’,’lik’,’ctbl’,’dyv’,’bll’,’bxz’,’mjz’,’mjg’,’dli’,’fjl’,’ska’,’dllx’,’tti’,’upa’,’txs’,’wsh’,’uzy’,’cfxxe’,’xdu’,’bup’,’spam’,’nls’,’iws’,’ezt’,’oar’,’.9,’blf’,’cxq’,’cxq’,’cc’,’dbd’,’xlv’,’rna’,’tko’,’delf’,’ceo’,’bhx’,’atm’,’lkh’,’vzr’,’ce0,’bps’,’pid’,’hsq’,’zvz’,’bmw’,’fuj’,’ssy’,’hts’,’qit’,’aepl’,’dx’,’lok’,’plc’,’mcq’,’cyw’,’let’,’bqf’,’iva’,’xnt’,’pr’,’lpaq5′,’capxml’

Once the user is tricked into opening the attachment, the infection takes place. This version of the .CRYPTOSHIEL file virus may drop multiple different files on the compromised computer by connecting to a remote host. The files may be:

Multiple executable files, some of which random names, from the .tmp and .exe file formats.

  • A javascript file, named recovery.js.
  • An executable file in the %system32% file folder.
  • It’s ransom note file.
  • Multiple other executable files that are .tmp and .tmp.exe, spread throughout Windows.

.CRYPTOSHIEL Ransomware – More Information

When this ransomware infection has already been activated, it may delete any chance of backup on the compromised computer. This activity is usually done by inserting commands with administrative privilege over at Windows Command Prompt. The commands are believed to be the following:

→ cmd.exe /C bcdedit /set {default} recoveryenabled No
cmd.exe /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
{DRIVE}:\Windows\System32\cmd.exe” /C vssadmin.exe Delete Shadows /All /Quiet
{DRIVE}:\Windows\System32\cmd.exe” /C net stop vss

After this, the .CRYPTOSHIEL file extension ransomware may modify settings that allow it’s files, like it’s ransom note and the malicious file encryption executable to start every time Windows has started. To encode those files, the CryptoShield ransomware uses the AES encryption algorithm. The virus may scan for a wide variety of file types amongst which are likely the following:

→ “PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG”Source:fileinfo.com

This virus uses the .CRYPTOSHIEL file extension to encode the files on the compromised computers. The files appear like the following after encryption takes place:

After the encryption process is complete, .CRYPTOSHIEL virus may automatically open it’s unique ransom note on the infected computer, asking users to pay a fee to get the data back.

Remove .CRYPTOSHIEL File Virus and Get Back Encrypted Files

For the removal process of this ransomware infection, recommendations are to focus on backing up the encrypted files initially.

Then, it is advisable to remove the ransomware infection preferably by following the removal instructions below. For maximum effectiveness of the removal, advice is to use an advanced anti-malware program which will automatically take care of the removal process for you.

For the file restoration, we have created several alternative file recovery tools that will help you restore your files. They are outlined In step “2. Restore files encrypted by .CRYPTOSHIEL File Virus”.

Manually delete .CRYPTOSHIEL Virus from your computer

Note! Substantial notification about the .CRYPTOSHIEL Virus threat: Manual removal of .CRYPTOSHIEL Virus requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove .CRYPTOSHIEL Virus files and objects
2.Find malicious files created by .CRYPTOSHIEL Virus on your PC

Automatically remove .CRYPTOSHIEL Virus by downloading an advanced anti-malware program

1. Remove .CRYPTOSHIEL Virus with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by .CRYPTOSHIEL Virus
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.