CrypBits256 Ransomware Uses Ransom Note in Portuguese

During our routine examination of new malware samples, our team of researchers came across the CrypBits256 ransomware. CrypBits256 is part of the Xorist ransomware family and operates by encrypting data and demanding a ransom for its decryption.

When CrypBits256 was launched on our test machine, it started encrypting files and adding the ".CrypBits256PT2" extension to their original filenames. For instance, a file named "1.jpg" would become "1.jpg.CrypBits256PT2", while "2.png" would become "2.png.CrypBits256PT2", and so on.

Once the encryption process was complete, CrypBits256 created two identical ransom notes: one in the form of a pop-up window and the other as a text file called "HOW TO DECRYPT FILES.txt." The message was written in Portuguese.

Upon translation, the ransom note explains to victims that their files and backups have been encrypted, and they can only recover them with a decryption key and software. This key and software can be obtained by paying an unspecified ransom amount. The note also warns victims that any attempts to rename, modify the extension, or delete the encrypted files will result in permanent data loss.

CrypBits256 Ransom Note Written in Portuguese

The full text of the CrypBits256 ransom note reads as follows:

Todos Dados/Backups foram criptografados
a unica forma de obter os dados em seu perfeito estado é
entrar em contato no Email: auditorbit256@protonmail.com
e obter o decryptor+chave unica por um pequeno valor.
Dados em perfeito estado em até 1 hora
prazo para o contato 09/11/2022 12:00 ID-0004
(N = NÂO)

  • N delete arquivos trancados
  • N não renomeie os arquivos trancados
  • N não altere a extensao dos arquivos trancados .CrypBits256
  • N não poste esta mensagem em nenhum site
    nem denuncie pois podem bloquear este email.

How Can Ransomware Like CrypBits256 Infect Your System?

Ransomware like CrypBits256 can infect your system in several ways. Here are some of the most common methods used by ransomware attackers to distribute their malicious software:

Email phishing: One of the most common methods for spreading ransomware is through phishing emails. Attackers send emails that appear to be from a trusted source and contain links or attachments that, when clicked, download the ransomware onto the victim's computer.

Malicious websites: Ransomware can also be distributed through malicious websites that contain infected software or scripts. Attackers use social engineering tactics to lure victims to these websites and trick them into downloading and installing the ransomware.

Exploiting vulnerabilities: Ransomware attackers often exploit vulnerabilities in software or operating systems to gain access to a victim's computer. These vulnerabilities can be found in outdated software that has not been patched with the latest security updates.

Malvertising: Attackers can also use malicious advertising or malvertising to spread ransomware. They use fake advertisements that appear on legitimate websites to trick users into clicking on them, which downloads the ransomware onto their computer.

In summary, ransomware like CrypBits256 can infect your system through various methods, including email phishing, malicious websites, exploiting vulnerabilities, and malvertising. It is important to be vigilant and take precautionary measures such as using antivirus software, avoiding suspicious links or attachments, keeping software up to date, and regularly backing up important data to prevent ransomware attacks.

May 4, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.