CypherPy Ransomware – Remove and Restore .crypt Files
THREAT REMOVAL

CypherPy Ransomware – Remove and Restore .crypt Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by CypherPy and other threats.
Threats such as CypherPy may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

This article aims to help you remove CypherPy ransomware from your computer and it also aims to show you how you can try and restore your files without having to pay a ransom.

New ransomware infection, called CypherPy has been detected by malware researchers. The virus is so far only a stub, but it can encrypt the files on infected computers via the AES encryption algorithm in CBC encryption mode. After encryption, the virus may append the .crypt file extension to the encrypted files and drops a file, named “README”, that aims to extort victims. At the moment the ransomware is in construction, but it may become active very soon. If you have already been infected by CypherPy ransomware, we strongly recommend that you read this article and learn how to remove CypherPy ransomware from your computer after which restore files with the .crypt file extension.

Threat Summary

NameCypherPy
TypeRansomware, Cryptovirus
Short DescriptionCurrently in construction. Encrypts the files using AES cipher and then may demand a ransom payoff. Can encrypt on Windows and Linux as well.
SymptomsA ransom note without an extension, named README and the .crypt file extension on the encoded files.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by CypherPy

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss CypherPy.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

How Can CypherPy Ransomware be Spread

In order to be spread, the CypherPy virus may come under different shapes. One of those may be a fake e-mail attachment, posing as Microsoft Word document. The document appears legitimate after you open it, however in it, there are instructions on how to enable macros to read it’s content (otherwise you can’t). When you click on the “Enable Content” button, the malicious macros are activated and your computer may become infected. The infection procedure via those document performs the following actions:

Besides infected Microsoft Office documents and .PDF files, other e-mail attachments may also be sent out, that directly infect your computer, once you open them. Such may be .wsf, .js, .exe and other files which can be concealed from your antivirus program when executed.

The e-mails that may be sent, containing CypherPy ransomware may are deceitful and very well thought out. They may pose as mails from big companies, such as:

  • eBay.
  • PayPal.
  • FedEx.
  • DHL.

The e-mails themselves may contain deceitful messages, like the example below displays:

Besides this, other methods of infection may also include using various different types of fake installers, downloaders and other methods that deceive you into downloading an infected file.

CypherPy – More Information About It

The CypherPy ransomware is a virus very similar to most ransomware threats out there. Upon infection, the malware drops multiple malicious files on the computer of it’s victims. They are usually located in the often targeted Windows folders, such as:

  • %AppData%
  • %Roaming%
  • %Local%
  • %LocalLow%
  • %Temp%

As soon as the malicious files, the main of which is called cyphermain.py, belonging to CypherPy ransomware are dropped, the virus may execute a script that runs commands in Windows command prompt. The commands may be as follows and aim to delete the shadow volume copies of an infected computer:

→ process call create “cmd.exe /c
vssadmin.exe delete shadows /all /quiet
bcdedit.exe /set {default} recoveryenabled no
bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

In addition to this, the virus may also create values In multiple different Windows Registry sub-keys. The most often targeted ones are the Windows Run and RunOnce sub-keys which are responsible for the malicious files of CypherPy to run every time Windows boots up. The keys are as follows:

→ HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

Among the activities of the CypherPy ransomware is to also connect to a remote host and transfer information about the infected computer, such as:

  • Your IP address.
  • Your location.
  • Network configuration.
  • Antivirus software installed.

Furthermore, it drops it’s distinctive ransom note, named “README” and at the moment of writing this, it looks like the following:

Source: id-ransomware.blogspot.com

CypherPy Ransomware – Encryption Process

When it comes to encrypting files, CypherPy ransomware performs multiple different activities, the main of which is to firstly scan your computer for the following types of files:

.3g2, .3gp, .7z, .asf, .asx, .avi, .bak, .bundle, .c, .cpp, .deb, .docx, .exe, .flv, .gif, .h, .html, .jar, .jpeg, .jpg, .log, .m2ts, .mkv, .mov, .mp3, .mp4, .mpeg, .mpg, .pdf, .php, .png, .py, .pyc, .rar, .rm, .sh, .sq1, .sqlite3, .swf, .tar, .tar.gz, .tiff, .txt, .vob, .wmv, .zip

If you have those files on your computer and it becomes infected with CypherPy ransomware, the virus encrypts them in CBC (Cipher Block Chain) mode using AES (Advanced Encryption Standard) encryption algorithm. This immediately results in the files no longer being able to be opened. And after this has been done, the virus at the time of writing this appends the .crypt file extension to the files. They may look like the following example image after their encryption:

The scariest part of it all is that the virus also works on Linux systems and can encrypt files there as well, suggesting that it may be slithered using an unknown Linux vulnerability(https://sensorstechforum.com/notorious-linux-bugs-vulnerabilities-exploits/) if someone decides to spread it.

Remove CypherPy Ransomware and Try Restoring .crypt Files

Even though this virus is still under construction, according to malware researcher Karsten Hahn (@struppigel), who unfolded it, it can be released any time and if you have been already infected by it, immediate removal actions are advisable. To remove CypherPy completely from your computer, our recommendations are to follow the instructions for Manual or Automatic removal below. They are specifically designed to help you remove the files and objects associated with this ransomware. For maximum effectiveness, it is also advisable to use an advanced anti-malware software that will help you automatically scan for and remove CypherPy from your PC, completely secure it and protect it against future intrusions as well.

Note! Your computer system may be affected by CypherPy and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as CypherPy.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove CypherPy follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove CypherPy files and objects
2. Find files created by CypherPy on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by CypherPy

Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...