CypherPy Ransomware – Remove and Restore .crypt Files

CypherPy Ransomware – Remove and Restore .crypt Files

This article aims to help you remove CypherPy ransomware from your computer and it also aims to show you how you can try and restore your files without having to pay a ransom.

New ransomware infection, called CypherPy has been detected by malware researchers. The virus is so far only a stub, but it can encrypt the files on infected computers via the AES encryption algorithm in CBC encryption mode. After encryption, the virus may append the .crypt file extension to the encrypted files and drops a file, named “README”, that aims to extort victims. At the moment the ransomware is in construction, but it may become active very soon. If you have already been infected by CypherPy ransomware, we strongly recommend that you read this article and learn how to remove CypherPy ransomware from your computer after which restore files with the .crypt file extension.

Threat Summary

NameCypherPy
TypeRansomware, Cryptovirus
Short DescriptionCurrently in construction. Encrypts the files using AES cipher and then may demand a ransom payoff. Can encrypt on Windows and Linux as well.
SymptomsA ransom note without an extension, named README and the .crypt file extension on the encoded files.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by CypherPy

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss CypherPy.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

How Can CypherPy Ransomware be Spread

In order to be spread, the CypherPy virus may come under different shapes. One of those may be a fake e-mail attachment, posing as Microsoft Word document. The document appears legitimate after you open it, however in it, there are instructions on how to enable macros to read it’s content (otherwise you can’t). When you click on the “Enable Content” button, the malicious macros are activated and your computer may become infected. The infection procedure via those document performs the following actions:

Besides infected Microsoft Office documents and .PDF files, other e-mail attachments may also be sent out, that directly infect your computer, once you open them. Such may be .wsf, .js, .exe and other files which can be concealed from your antivirus program when executed.

The e-mails that may be sent, containing CypherPy ransomware may are deceitful and very well thought out. They may pose as mails from big companies, such as:

  • eBay.
  • PayPal.
  • FedEx.
  • DHL.

The e-mails themselves may contain deceitful messages, like the example below displays:

Besides this, other methods of infection may also include using various different types of fake installers, downloaders and other methods that deceive you into downloading an infected file.

CypherPy – More Information About It

The CypherPy ransomware is a virus very similar to most ransomware threats out there. Upon infection, the malware drops multiple malicious files on the computer of it’s victims. They are usually located in the often targeted Windows folders, such as:

  • %AppData%
  • %Roaming%
  • %Local%
  • %LocalLow%
  • %Temp%

As soon as the malicious files, the main of which is called cyphermain.py, belonging to CypherPy ransomware are dropped, the virus may execute a script that runs commands in Windows command prompt. The commands may be as follows and aim to delete the shadow volume copies of an infected computer:

→ process call create “cmd.exe /c
vssadmin.exe delete shadows /all /quiet
bcdedit.exe /set {default} recoveryenabled no
bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

In addition to this, the virus may also create values In multiple different Windows Registry sub-keys. The most often targeted ones are the Windows Run and RunOnce sub-keys which are responsible for the malicious files of CypherPy to run every time Windows boots up. The keys are as follows:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

Among the activities of the CypherPy ransomware is to also connect to a remote host and transfer information about the infected computer, such as:

  • Your IP address.
  • Your location.
  • Network configuration.
  • Antivirus software installed.

Furthermore, it drops it’s distinctive ransom note, named “README” and at the moment of writing this, it looks like the following:

Source: id-ransomware.blogspot.com

CypherPy Ransomware – Encryption Process

When it comes to encrypting files, CypherPy ransomware performs multiple different activities, the main of which is to firstly scan your computer for the following types of files:

.3g2, .3gp, .7z, .asf, .asx, .avi, .bak, .bundle, .c, .cpp, .deb, .docx, .exe, .flv, .gif, .h, .html, .jar, .jpeg, .jpg, .log, .m2ts, .mkv, .mov, .mp3, .mp4, .mpeg, .mpg, .pdf, .php, .png, .py, .pyc, .rar, .rm, .sh, .sq1, .sqlite3, .swf, .tar, .tar.gz, .tiff, .txt, .vob, .wmv, .zip

If you have those files on your computer and it becomes infected with CypherPy ransomware, the virus encrypts them in CBC (Cipher Block Chain) mode using AES (Advanced Encryption Standard) encryption algorithm. This immediately results in the files no longer being able to be opened. And after this has been done, the virus at the time of writing this appends the .crypt file extension to the files. They may look like the following example image after their encryption:

The scariest part of it all is that the virus also works on Linux systems and can encrypt files there as well, suggesting that it may be slithered using an unknown Linux vulnerability(https://sensorstechforum.com/notorious-linux-bugs-vulnerabilities-exploits/) if someone decides to spread it.

Remove CypherPy Ransomware and Try Restoring .crypt Files

Even though this virus is still under construction, according to malware researcher Karsten Hahn (@struppigel), who unfolded it, it can be released any time and if you have been already infected by it, immediate removal actions are advisable. To remove CypherPy completely from your computer, our recommendations are to follow the instructions for Manual or Automatic removal below. They are specifically designed to help you remove the files and objects associated with this ransomware. For maximum effectiveness, it is also advisable to use an advanced anti-malware software that will help you automatically scan for and remove CypherPy from your PC, completely secure it and protect it against future intrusions as well.

Manually delete CypherPy from your computer

Note! Substantial notification about the CypherPy threat: Manual removal of CypherPy requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove CypherPy files and objects
2.Find malicious files created by CypherPy on your PC

Automatically remove CypherPy by downloading an advanced anti-malware program

1. Remove CypherPy with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by CypherPy
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...