• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

A Sneaky Ransomware That Seems Benificial. But Deceptive.

5389

There is a new malware called vxCrypter ransomware in the digital space and it is capable of encrypting your files along and ‘improve’ your PC’s performance.VxCrypter is a ransomware based on an old ransomware named vxLock, which is still unfinished. It had utilized Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman or RSA algorithm to encrypt files.

The VxCrypter keeps track of the SHA-256 of every file. An SHA-256 is an algorithm that changes data into a fixed fingerprint. Every file has a unique SHA-256 fingerprint, so a file’s copy will have the same SHA-256 code.Any file identical to SHA-256 code is deleted, thus clearing the space on PX and improving performance. This way, the encryption speed is also increased.

VxCrypter Ransomware deletes files with identical SHA-256 code, essentially clearing up space on your PC and improving performance. It does so to increase encryption speed.But it is a decoy, as the victim may think that the effect is beneficial due to enhanced performamce, in the background, the ransomware will encrypt all the files in the system even faster..txt, .docx, .xls, .ppt, .zip, .xml, .wmv etc., are some of the most commonly affected formats.

Tags:
lincoln
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 0 )

No questions available

Related Forums in A Sneaky Ransomware That Seems Benificial. But Deceptive.

Related Forums in A Sneaky Ransomware That Seems Benificial. But Deceptive.

Scam (Ransomware)
jayden class=
Will ransome virus will affect linux server
May 16, 2017

Related News in A Sneaky Ransomware That Seems Benificial. But Deceptive.

Related News in A Sneaky Ransomware That Seems Benificial. But Deceptive.

CryptoMix Clop Ransomware Variant Targets Not Individual Machines But Whole Networks
CryptoMix Clop Ransomware Variant Targets Not Individual Machines But Whole Networks
Mar 12, 2019
URL Attacks and The Ways to Stay Away from Them!
URL Attacks and The Ways to Stay Away from Them!
Mar 19, 2019
Mailing error leads to confusion among the Inmediata Health Group’s breached patients
Mailing error leads to confusion among the Inmediata Health Group’s breached patients
May 24, 2019
Security Breach In The World's First Domain Registrar Network Solutions
Security Breach In The World's First Domain Registrar Network Solutions
Nov 5, 2019
FIN7 still to be found via Astra tools even after arrests
FIN7 still to be found via Astra tools even after arrests
Mar 26, 2019
Streaming List of GPS Locations Exposed From Saudi Telecom Provider
Streaming List of GPS Locations Exposed From Saudi Telecom Provider
Dec 17, 2019
ECh0raix Ransomware Strain QNAP NAS devices
ECh0raix Ransomware Strain QNAP NAS devices
Jul 30, 2019
'The Nasty List' Instagram Phishing Scam Targets Instagram Credentials
'The Nasty List' Instagram Phishing Scam Targets Instagram Credentials
Apr 19, 2019
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Ganesh Konka ?
Zentya 6.1 http proxy configuration

please send link for creating zentyal 6.1 for http proxy and firewall as gateway.

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.