With the release of yet another version of the notorious Cerber ransomware, malware authors have proven that so far they cannot be stopped. The version of the malware (5.0.1) is detected in parallel with Locky’s latest update using the .zzzzz file extension, suggesting competition between the two ransomware makers. Ransomware attacks have continued to increase and users who have had their files encrypted by such viruses are requested to pay a hefty ransom fee in order to get their files back. Anyone who has been infected by the ransomware should not pay the ransom amount.
Cerber ransomware may use .hta, .html or .htm files with which it can cause an infection via a spam message sent out to the users, infections are also being caused via malicious web links uploaded online and sent out as a message on either social media or other places that favor third-party web links. Once installed, Cerber 5.0 will encrypt the victim’s data and then demand a ransom payment in bitcoins to decrypt the files.
– The .secret extension is added to the list of files types targeted for encryption.
– The ransomware will now skip 640 bytes, compared to 512 bytes in previous versions, when encrypting a file.
– The minimum file size that Cerber will encrypt a file is now 2,560 bytes, compared to 1,024 bytes in previous versions. This means that any file that is smaller than 2,560 bytes will not be encrypted.
Like always, we close this blog with suggestion that users of any computing devices should be careful before downloading any software and decline any free software. Also keep a good anti virus program such as Max Total Security and have peace of mind with advance detection and daily data backup (just in case some ransomware makes it to your files!).