PooleZoor Ransomware
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
At the time of publication it is not known how PooleZoor is distributed, but this is most likely to be via spam emails and malicious downloads.
Encrypted files are appended with the .poolezoor extension. The ransomware uses several methods to make recovery more difficult. Volume Shadow Copies and System Restore snapshots are removed. Configuration changes are made so that PooleZoor will run automatically, and boot-time recovery options are disabled to make it harder to reverse this. PooleZoor can also modify the registry, which may lead to performance issues in Windows and various applications.
Remediation steps
| Type | Step |
|---|---|
|
If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection:
To limit the damage of ransomware and enable recovery:
|
Last edited: 17 February 2020 12:52 pm