CryptON Ransomware
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
The threat actors exploit RDS and then execute CryptON. The ransomware encrypts files and appends filenames with a [email protected] extension. Shadow Copies are deleted in most instances, but they are occasionally left untouched.
A file containing a ransom note is created in every folder where files have been encrypted. This demands that the user connects to a Tor website, from which they can communicate with the attacker and receive payment instructions.
There is no known method for decrypting files that have been encrypted by the latest variant of CryptON.
Remediation steps
| Type | Step |
|---|---|
|
If Remote Desktop Services (RDS) are not used, then ensure port 3389 (TCP/UDP) is blocked at your internet firewall. If RDS is used, then:
If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection:
To limit the damage of ransomware and enable recovery:
|
Last edited: 17 February 2020 12:41 pm