July 24, 2017 By Douglas Bonderud 2 min read

Ransomware depends on speed. Quick infections and tight payment timelines compel users to pay up or risk the loss of critical files, while rapid iteration lets malware-makers stay one step ahead of security experts.

As noted by Bleeping Computer, new strains of CryptoMix malware are now hitting networks within weeks of each other — a tactic previously used by Locky ransomware to confuse and confound users. Here’s a look at the newest crypto variants.

Extended Issues

According to the Bleeping Computer piece, two new variants of CryptoMix have appeared in recent weeks: NOOB and ZAKYA. The main difference? Their file extension, with NOOB appending a NOOB extension and ZAYKA appending ZAYKA.

The two also use different public RSA keys to encrypt AES keys and lock down user files, but both still point to the same address for payment. They also use a ransom note labeled as _HELP_INSTRUCTION.TXT, but the malware-makers have put in varying amounts of effort to communicate their demands.

In the NOOB version, this ransom note offers only basic information, saying, “Need back files?” It then provides the email addresses and a decrypt ID.

The ZAYKA variant, meanwhile, explains that victims must pay the ransom in bitcoins, suggests a way to buy those bitcoins and promises to decrypt three files for free as a show of good faith, so long as the files do not contain valuable information and total less than 1 MB in size. This version of CryptoMix makes it clear that time is running out, informing users that “the price depends on how fast you write to us” and warning that if no email is forthcoming within 36 hours, all decryption keys will be deleted, according to Bleeping Computer.

CryptoMix: Off and Running?

Other variants of CryptoMix have also emerged over the last few weeks. SC Magazine described the .EXTE version, which appends this extension and uses several email hosts to take payment. Bleeping Computer also reported on Azer, a variant of CryptoMix that leveraged a new ransom note file path and odd email addresses for users to pay up. But what really sets Azer apart is its ability to work offline.

Rather than using traceable network communication, this version embeds 10 different RSA-1024 public encryption keys and then selects one to encrypt the AES key, a significant step up from the single RSA-1024 key used by the recent Mole02 variant. Azer is notable here because it operates in a space typically considered safe from ransomware: offline.

While many CryptoMix versions aren’t exactly cutting edge, the fast pace of deployment helps give this malware an edge over other offerings. Just as security researches solve current issues, new variants emerge in the wild. Most are simply small modifications to existing encryption methods, but occasional diversions such as Azer make it tough for victims and experts alike to crack down on crypto code.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today