• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Chimera ransomware is now even harder to decrypt

Updated on Nov 10, 2015 by Guest Authors

Chimera, a long standing ransomware that has been targeting individuals and businesses in Germany, has recently resurfaced with a new threat to expose to the public the data it holds from its victims.

The old ransomware has been at work to encrypt computer files and network drives and ask the file’s owner for a sum to restore the stolen data. Now the creators of Chimera have elevated the features and capabilities of the ransomware to publish the encrypted pieces of information online if the owner does not give in to the demands of the attacker.

Chimera-ransomware

Before, Chimera used to spread via emails and links for approximately two months, according to an advisory.

There seems to be a common trend in the emails that are targeted to a specific segment of the victims. The email would contain a URL or link to a Dropbox file that the sender would claim to be containing an important information. Then the landing page would ask the target individual to download the list of files to their computer.

The risk arises when the recipient of the malicious email clicks on the download link, which will then infiltrate the victim’s computer with malware that is designed to encrypt all the data stored in the machine, as well as the network drives that are linked to the computer being attacked.

This will become noticeable as all the file extensions in your computer will be changed to .crypt, meaning your files are now encrypted and you cannot open them. What remains concealed, however, is the fact that you have just been locked out of your computer, devoid of access to your personal files, until a ransom note will greet you on your next reboot.

Chimera creators will ask their victims a ransom money of up to $685 that the victim needs to pay in Bitcoin. If you choose not to pay the ransom, the attackers will threaten you to have all of your data leaked online, although there has been no known instance of such a data leak as of this posting.

This threat is quite something new as far as the way it scares its victims is concerned. The previous version of Chimera only worked by encrypting data that had been stored in the computer’s local drive. Once the ransom was paid, the attacker would send the private encryption key to the victim to unlock the data. There was no instance also of publicly leaked data.

One way to avoid falling prey to this kind of cyber crime is to back up your data and store sensitive information in the cloud.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Comments

  1. Peach drinkwine says

    Dec 25, 2015 at 12:20 pm

    i would rather not store things into the cloud because hackers can have access to it i would much rather store it on a offsite backup and most defiantly offline

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Hohem iSteady Mobile Plus Gimbal Stabilizer Review – Upgrade Your Phone Videography On A Budget

Airdog X5 Air Purifier Review – Is TPA Better Than HEPA Filter?

Welock Touch43 Fingerprint Smart Lock Review

HeyChy Deep Tissue Massage Gun Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Secure Your Home With SECURAM
  • C3STROM ASTRO PRO – An E-Bike with Classic Rebel Motorcycle and Modern Ride
  • Bluetti AC500 & B300S Hit Canada Market During 2023 New Year Sale
  • Hohem iSteady Mobile Plus Gimbal Stabilizer Review – Upgrade Your Phone Videography On A Budget

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}