{"id":19431,"date":"2016-07-22T10:29:12","date_gmt":"2016-07-22T16:29:12","guid":{"rendered":"https://www.webroot.com/blog/?p=19431"},"modified":"2018-01-30T11:13:50","modified_gmt":"2018-01-30T18:13:50","slug":"cerber-ransomware-facts","status":"publish","type":"post","link":"https://www.webroot.com/blog/2016\/07\/22\/cerber-ransomware-facts\/","title":{"rendered":"Cerber Ransomware: The Facts"},"content":{"rendered":"<p>Cerber is yet another newer ransomware that has been gaining\u00a0some traction over the past couple\u00a0months, so we&#8217;re providing a breakdown of this new variant. First, here is how it looks:<\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2016\/07\/desktop1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-19433\" src=\"\/blog\/wp-content\/uploads\/2016\/07\/desktop1.png\" alt=\"desktop1\" width=\"634\" height=\"521\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2016\/07\/desktop1.png 634w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2016\/07\/desktop1-768x631.png 768w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/><\/a><\/p>\n<p>Unlike some other ransomware variants, Cerber is certainly not going for aesthetics. It also\u00a0lacks any type of GUI. However, it does change\u00a0your background to an awful pixelated image of static that&#8217;s not comfortable to look at, but it achieves its goal of\u00a0getting the victims&#8217; attention.<\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2016\/07\/ransom-text.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-19435\" src=\"\/blog\/wp-content\/uploads\/2016\/07\/ransom-text.png\" alt=\"ransom text\" width=\"757\" height=\"519\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2016\/07\/ransom-text.png 757w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2016\/07\/ransom-text-768x526.png 768w\" sizes=\"(max-width: 757px) 100vw, 757px\" \/><\/a><\/p>\n<p>The ransom text is quite extensive and attempts to answer as many questions as the victims might have. The end goal is to get the user to follow directions to install a layered tor browser so they can access the dark net and pay the ransom with Bitcoins. This is what the ransom portal looks like:<\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2016\/07\/payment.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-19437 size-full\" src=\"\/blog\/wp-content\/uploads\/2016\/07\/payment-e1469136090962.png\" alt=\"payment\" width=\"1002\" height=\"788\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2016\/07\/payment-e1469136090962.png 1002w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2016\/07\/payment-e1469136090962-768x603.png 768w\" sizes=\"(max-width: 1002px) 100vw, 1002px\" \/><\/a><\/p>\n<p>This\u00a0Cerber variant specifically wants 2 BTC, which is a huge sum of money (around $1,300) compared to variants seen in the past. As with older types, there is a &#8216;late fee&#8217; that doubles the ransom if it isn&#8217;t paid in the original time frame. It appears that this trend of charging more money is new and is continuing to catch on.\u00a0Also included with Cerber are &#8220;freebies&#8221;, which means that you get one free decrypt of a file. This was introduced by <a href=\"https:\/\/www.webroot.com\/blog\/2014\/11\/14\/coinvault\/\">coinvault<\/a> in 2014 to great success, so now almost all ransomware types include it.<\/p>\n<p>Webroot will catch this specific variant in real time before any encryption takes place. We\u2019re always on the lookout for new threats, but just in case of new zero-day variants, remember that with encrypting ransomware, the best protection is going to be a good backup solution. This can be either through the cloud or offline external storage. Keeping it up to date is key so as not to lose productivity. Webroot has backup features built into our consumer product that allow you to have directories constantly synced to the cloud. If you were to get infected by a zero-day variant of encrypting ransomware, you can just restore your files back as we save a snapshot history for each of your files up to ten previous copies. Please see our <a href=\"https:\/\/community.webroot.com\/t5\/Webroot-Education\/Best-practices-for-securing-your-environment-against\/ta-p\/191172\">community post<\/a> on best practices for securing your environment against encrypting ransomware.<\/p>\n<p>MD5\u00a0Analyzed:<\/p>\n<p>c3cd90c3e406981bece559a43fe64414<\/p>\n<p>383803a90293408e36063809319f5982<\/p>\n<p>065033243f30b1e54241a932c5e706fd<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cerber is yet another newer ransomware that has been gaining\u00a0some traction over the past couple\u00a0months, so we&#8217;re providing a breakdown of this new variant. First, here is how it looks: Unlike some other ransomware variants, Cerber is certainly not going for aesthetics. It also\u00a0lacks any type of GUI. However, it does change\u00a0your background to an [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":18345,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[5451,5447,5437,4725,5443,5435,3483,5445,4289,4149,5423,3937,3777,3751,5439,5441,3989,3525,5449],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19431"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=19431"}],"version-history":[{"count":3,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19431\/revisions"}],"predecessor-version":[{"id":19465,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19431\/revisions\/19465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/18345"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=19431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=19431"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=19431"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=19431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}