There are affiliate links on this page.
Read our disclosure policy to learn more.

Ransomware Attack May 2017: Ooops, your files have been encrypted!

2020 and 2021 saw a new ransomware virus, spread by email with faked information to make you believe that the email is from DHL or FedEx.



 If you received the email and clicked on the links, you saw a screen demanding payment of $300 worth of the online currency Bitcoin, and a subject like:

"Nemty RansomwareMy love," "Don't tell anyone," "You should read this,

If you open any attachments in the email, NEMTY encrypts your data (files, images, videos) with the ".NEMTY" extension. Once your files are encrypted with the ".NEMTY" extension, you cannot open these files. The criminals behind the ransomware threaten to leak your data if you don't pay the ransom, not just encrypt your files. This is an escalation from previous ransomware threats. You can see an example of their ransom note at right, demanding a payment of $750 or more in Bitcoin.

Nemty ransomware targets all versions of Windows including Windows 7, Windows 8.1 and Windows 10.

Nemty ransomware is sent via a spam email campaign using emails that pose as messages from lovers.

The email commonly had subjects that included "My love," "Don't tell anyone," "You should read this," "Will be our secret," "Can't forget you," "Letter for you," "Just for you," and "My loveletter." The emails usually only contain only a wink emoticon in its email body.

Attached to each email is a ZIP archive with a name formatted as 'LOVE_YOU_######_2020.zip' with only the #s changing, such as LOVE_YOU__2020.zip. The ZIP files contain a malicious obfuscated JavaScript file named LOVE_YOU.js. Nemty also deletes all of the Shadow Volume Copies if you have this type of back up so that you cannot use the shadow volume copies to restore your encrypted files.

Nemty ransomware first appeared  in August 2019.  The ransomware has spread to at least 150 countries, including the UK, Japan, Spain, France, China, Russia and the U.S.. Estimates are that over 200,000 computers have been infected.

Key information if you click on a link

  • The ransomware encrypts your computer's data (photos, videos and files such as .doc, .docx, .xls, .pdf, etc.)
  • You see the message above, demanding a ransom to unlock it,
  • The attacks use malware to encrypt  files with the ".NEMTY" extension to the end of the file name:

Who is at risk?

The ransomware seems to take advantage of a weakness in versions of Microsoft Windows operating systems which are not up to date on security patches. As of May 2017, there have been no reports ofd it affecting Apple computers, ipads or iphone nor Android cell phones.

How to prevent itNorton Security safe status screen

Make sure your computer's operating system has all current updates and security patches.  In Windows,

  • use the "Search Windows" in the bottom left corner to search for "check for updates" or
  • go to Control Panel  and navigate to Control Panel - All Control Panel Items - Security and Maintenance
  • Make sure your security software is also updated We recommend Norton Security. See the boxes at right and see this page for all recommendations.

AND ABOVE ALL:

Make regular backups, of

  • Important documents, files, photos, contact lists, etc. and
  • System files.

By far the best way to do this is with a system image. A system image makes a complete backup of all files on a disk, including data, programs and system files. If something happens to your system, or even the C drive fails, you can reset the system and restore everything from the system image, which should be stored on a separate drive from the system drive.

You can make a system image from within Windows 10, in control panel.  Search there for:

  • Control Panel\System and Security\Backup and Restore (Windows 7)

System images are large files, so be sure to have a backup drive (either internal or attached externally) that has a lot of space on it (say at least 250 GB, of course, 500 GB or 1 TB would be better still)

You can find easy to follow, complete directions about making system image backups here on How to Geek how to Make System Images

Who has been affected?

  • FedEx Corp.
  • France's government cybersecurity agency warned French Internet users to take measures to protect themselves
  • Russia's Interior Ministry says it has come under cyberattack.
  • Hospitals in the U.K.
  • Telecommunications companies in Spain

What to do if your computer has been ransommed

The best method is to use a professional service or professional software, like MalwareBytes or Symantec Norton Security

Malwarebytes says:

It is critical that you install all available OS updates to prevent getting exploited by the MS17-010 vulnerability. Any systems running a Windows version that did not receive a patch for this vulnerability should be removed from all networks. If your systems have been affected, DOUBLEPULSAR will have also been installed, so this will need to also be removed.A script is available that can remotely detect and remove the DOUBLEPULSAR backdoor. Consumer and business customers of Malwarebytes are protected from this ransomware by the premium version of Malwarebytes and Malwarebytes Endpoint Security, respectively.

Symantec says (May 2017):

Decryption is not available at this time but Symantec is investigating. Symantec does not recommend paying the ransom. Encrypted files should be restored from back-ups where possible.

But Symantec also has a page providing their own detailed removal instructions here.

So, let's be clear; your encrypted files are gone, but you can remove the virus and make your computer safe for use again.  Here is how:

 

For those who feel up to the challenge of going it alone, here are the general directions with links to more details. Encrypted files will have .WCRY appended to the end of the file names. The Trojan then deletes the shadow copies of the encrypted files. The Trojan drops the following files in every folder where files are encrypted: !WannaDecryptor!.exe.lnk  and !Please Read Me!.txt.

  1. Turn off your pc.
  2. Restart your computer in Safe Mode.
    Windows 10:  Restart your PC. When you get to the sign-in screen, hold the Shift key down while you select Power Power icon > Restart.
    After your PC restarts to the Choose an option screen, select Troubleshoot > Advanced options > Startup Settings > Restart.
    After your PC restarts, you'll see a list of options. Select 4 or F4 to start your PC in Safe Mode. Or if you'll need to use the Internet, select 5 or F5 for Safe Mode with Networking.
    Windows 7: Turn on the computer and immediately begin pressing the F8 key repeatedly.
    From the Windows Advanced Options Menu, use the arrow keys to select Safe Mode, and press ENTER.
  3. On your desktop, delete all of the files labeled anything like WannaCry,  WCry, WannaCry, WanaCrypt0r, WannaCrypt, or Wana Decrypt0r. See this YouTube video for more.
  4. Go to start and search for any other files with WannaCry in their names.  Delete them. Some of them are in Users/AdminAppData/Local. Remove all the files other than the one you cannot that starts with FX in Users/AdminAppData/Local/Temp
  5. GZo to start, and open RegEdit. Editing this file is like performing brain surgery. See this YouTube for the changes to make.
  6. You should be able to restart your computer now in normal mode.

Who is behind the malware?

The Guardian, SlashDot, CNBC and NY Times are reporting that  North Korea is behind the WannaCry ransomware. Kaspersky and Symantec both said on Monday that the North Korean cybergang known as Lazarus Group used very similar code. in 2015 and in  the 2014 attack on Sony Pictures and an $81m heist on a Bangladeshi bank in 2016.

References

  1. Symantec (Norton) general description
  2. Symantec (Norton) detailed description
  3. UK The Telegraph
  4. Symantec (Norton Security)