June 20, 2016
Don't Fall Victim to Crysis Ransomware
According to ESET, Crysis can encrypt files on fixed, removable, and network drives and it uses strong encryption algorithms and a scheme that makes it difficult to crack in a reasonable amount of time.
Crysis is typically spread via emails containing attachments with double-file extension, which make the file appear as a non-executable file. In addition to emails, it can also be disguised as a legitimate installer for applications.
Crysis also carries a slightly higher price tag than what we generally see with ransom demands. According to ESET, the ransom demand ranges from $450 to over $1,000. Crysis can infect both Windows and Mac machines, according to HealthcareITNews. Its advanced encryption codes allow hackers to gain administrative access to the infected system and inflict additional damage.
In addition to the capabilities outlined above, Crysis can also exfiltrate data and user credentials.
As always, taking the proper precautions is the best way to protect yourself from any form of ransomware. In the event you’re hacked, the best way to avoid paying a ransom is to have a proper business continuity and disaster recovery (BCDR) solution featuring up-to-date backups. This will allow you to restore your data to a point in time before the infection, and retain your precious data.
For more tips and tricks on all things ransomware, download our eBook: The Business Guide To Ransomware.