Malwarebytes rolls out free decryption tool for VindowsLocker ransomware victims

Edward Hudson By: Edward Hudson
2 minute read

Home » News » Malwarebytes rolls out free decryption tool for VindowsLocker ransomware victims

Malwarebytes has released a free decryption tool to help victims of a recent ransomware attack recover their data from cyber criminals employing a tech support scam technique. The new ransomware variant called VindowsLocker surfaced last week. It works by connecting victims to phony Microsoft technicians to have their files encrypted using a Pastebin API.

Tech support scammers have been targeting unsuspecting internet users for quite a while now. A combination of social engineering and deception, the malicious tactic has evolved from cold calls to fake alerts and, most recently, screen locks. Tech support scammers have now added ransomware to their attack arsenal.

Jakub Kroustek, an AVG security researcher, first detected the VindowsLocker ransomware and named the threat based on the file extension .vindows it appends to all encrypted files. The VindowsLocker ransomware uses the AES encryption algorithm to lock files with the following extensions:

txt, doc, docx, xls, xlsx, ppt, pptx, odt, jpg, png, csv, sql, mdb, sln, php, asp, aspx, html, xml, psd

VindowsLocker mimics tech support scam

The ransomware employs a tactic typical of most tech support scams in that victims are asked to call a phone number provided and talk to a tech support personnel. In contrast, ransomware attacks in the past asked for payments and handled decryption keys using a Dark Web portal.

this not microsoft vindows support
we have locked your files with the zeus virus
do one thing and call level 5 microsoft support technician at 1-844-609-3192
you will files back for a one time charge of $349.99

Malwarebytes believes the scammers operate based out of India and mimic Microsoft’s tech support personnel. VindowsLocker also uses a seemingly legit Windows support page to give the false impression that the tech support is ready to help the victims. The support page asks for the victim’s email address and banking credentials to process the payment of $349.99 to unlock a computer. However, paying the ransom money doesn’t help users recover their files according to Malwarebytes. This is because VindowsLocker developers are now unable to automatically decrypt an infected computer due to some coding errors.

Malwarebytes explains that VindowsLocker ransomware coders have botched one of the API keys intended for use in short sessions. Consequently, the API key expires after a short period and the encrypted files go online, barring the VindowsLocker developers from providing the AES encryption keys to victims.

Read also:

Discussions

Next up

Windows media player cannot convert file to required format [FIX]

Tashreef Shareef avatar. By: Tashreef Shareef
3 minute read

The Sync function offered by the Windows Media Player allows the users to sync their favorite tracks between the PC and the smartphone. Sometimes, the […]

Continue Reading

KB4497936 is now available to all Windows 10 v 1903 users

Rabia Noureen avatar. By: Rabia Noureen
2 minute read

Microsoft confirmed that non-Insiders running the Windows 10 May 2019 Update are also getting cumulative update KB4497936. Microsoft rolled out KB4497936 to all the devices […]

Continue Reading

Windows XP KB4500331 patches severe security vulnerabilities

Rabia Noureen avatar. By: Rabia Noureen
2 minute read

Microsoft recently released a critical update (KB4500331) to patch a remote code execution vulnerability in Windows XP. It’s been years since Microsoft ended official support […]

Continue Reading