{"id":185524,"date":"2017-03-31T06:40:55","date_gmt":"2017-03-31T10:40:55","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/bitcoin-ransomware-education-crptxxx-the-merkle\/"},"modified":"2017-03-31T06:40:55","modified_gmt":"2017-03-31T10:40:55","slug":"bitcoin-ransomware-education-crptxxx-the-merkle","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/bitcoin-2\/bitcoin-ransomware-education-crptxxx-the-merkle\/","title":{"rendered":"Bitcoin Ransomware Education  CrptXXX &#8211; The Merkle"},"content":{"rendered":"<p><p>    Bitcoin ransomware families are plentiful, which is what    makes them incredibly dangerous. In some cases, different types    of ransomware will have a similar name, which causes some    confusion. CrptXXX is a type of malware that should not be    confused with CryptXXX, even though both types of malicious    software work towards a similar goal. CrptXXX is quite a    powerful type of malware, although it can be removed with    relative ease.  <\/p>\n<p>    Most people are well aware of how     ransomware works. This malicious software    encrypts all files on the computer, gives them a random file    extension, and forces users to pay a ransom in bitcoin to    restore file access. However, certain types of malware have    proven to be quite more potent than others, as its developers    bring additional features to the table. After all, why only    encrypt data when there is much more havoc to wreak?  <\/p>\n<p>    In the case of CrptXXX, the ransomware does a few    different things. Granted, in adds the.crptxxx extension to all    encrypted files. Moreover, once this payload is active on a    computer, it can modify all accessible files with relative    ease. This allows users to retain some level of control over    the machine so they can pay the ransom. Neither of these    features is out of the ordinary, as those are the basic    functions of any malware strain in existence.  <\/p>\n<p>    What CrptXXX does differently is how it also allows the    ransomware developer to gain remote control over the computer    as long as the files remain encrypted. This gives    criminals     backdoor access to the device in    question, which allows them to copy any file from the computer    and make it their own. Through a dedicated Trojan component,    CrptXXX victims can be spied upon at any given time, which is    quite a troubling thought.  <\/p>\n<p>    Speaking of which, information harvesting is what makes    CrptXXX even more dangerous compared to most other types of    malware. Downloading key settings, recording account    credentials, and even stealing personal files is just a few of    the possibilities. However, the bread and butter remains    infected files and demanding a bitcoin ransom to have file    access restored. With a variable ransom demand, CrptXXX    developers are always looking for their next big score.  <\/p>\n<p>    Distribution of CrptXXX is what one would expect from    similar campaigns these days. Email spam, pirated content    downloads, and infected software installers are the three most    common distribution methods for CrptXXX. Additionally, it is    possible to infect victims with this payload through direct    attacks in the form of exploit kits or vulnerability testing    frameworks. So far, CrptXXX is believed to have caused quite a    bit of damage, although a solution has been provided to remove    the malware completely without paying the bitcoin    ransom.  <\/p>\n<p>    Unlike most other types of ransomware, CrptXXX does not    appear to delete the shadow volume copies. This allows users to    restore files from a previous data backup. That is quite a    relief to most people who had to deal with this ransomware in    the past, as there is nothing more disturbing than losing    valuable files due to a malware attack. Always back up    important computer files on a regular basis, as one never knows    when that backup may come in handy.  <\/p>\n<p>    If you liked this article, follow us on Twitter    @themerklenews and make sure to subscribe to our newsletter to    receive the latest bitcoin, cryptocurrency, and technology    news.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"https:\/\/themerkle.com\/bitcoin-ransomware-education-crptxxx\/\" title=\"Bitcoin Ransomware Education  CrptXXX - The Merkle\">Bitcoin Ransomware Education  CrptXXX - The Merkle<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Bitcoin ransomware families are plentiful, which is what makes them incredibly dangerous.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/bitcoin-2\/bitcoin-ransomware-education-crptxxx-the-merkle\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94873],"tags":[],"class_list":["post-185524","post","type-post","status-publish","format-standard","hentry","category-bitcoin-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/185524"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=185524"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/185524\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=185524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=185524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=185524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}