A new distribution campaign is underway for a STOP Ransomware variant called KeyPass based on the amount of victims that have been seen. Unfortunately, how the ransomware is being distributed is unknown at this time.
Not much is known regarding how this ransomware is being distributed other than what people have posted in the BleepingComputer forums. According to some of the posts, the ransomware appeared after the user downloaded and installed cracks such as KMSpico. Other reports state that it appeared on its own and that the victim did not install anything.
Based on submissions to ID Ransomware there has been increased activity for this variant since the 8th with submissions from over 20 countries.
KEYPASS ransomware (https://t.co/tvDOORxLpd) is spreading all over the Earth.— MalwareHunterTeam (@malwrhunterteam) August 10, 2018
From late evening of 8th this month, already got 100 submissions to IDR, from more than 20 countries.
Anyone got sample yet? Or at least info about how it's spreading?@BleepinComputer @demonslay335
You can see this uptick in submissions on ID Ransomware in the graph below.
It should be noted that this ransomware, even though the names sound similar, has no relation to the popular KeePass password management utility.
When a user become infected with the KeyPass ransomware, their files will be encrypted and then have the .KEYPASS extension appended to them. For example, a file called test.jpg would be encrypted and renamed to test.jpg.KEYPASS.
The ransomware will also create ransom notes named !!!KEYPASS_DECRYPTION_INFO!!!.txt that contain instructions to email either email@example.com or firstname.lastname@example.org for payment instructions.
Unfortunately, not much more is known about this ransomware. If you are infected and want to discuss the ransomware or need help, you can use the dedicated KeyPass Ransomware Help & Support Topic.
As it is not known how the KeyPass Ransomware is distributed, to protect yourself you should follow these general guidelines. The most important step is to always have a reliable and tested backup of your data that can be restored in the case of an emergency, such as a ransomware attack.
You should also make sure that you do not have any computers running remote desktop services connected directly to the Internet. Instead place computers running remote desktop behind VPNs so that they are only accessible to those who have VPN accounts on your network.
A good security software solution that incorporates behavioral detections to combat ransomware and not just use signature detections or heuristics is important as well. For example, Emsisoft Anti-Malware and Malwarebytes Anti-Malware both contain behavioral detection that can prevent many, if not most, ransomware infections from encrypting a computer.
Last, but not least, make sure you practice the following security habits, which in many cases are the most important steps of all:
For a complete guide on ransomware protection, you visit our How to Protect and Harden a Computer against Ransomware article.
Attention! All your files, documents, photos, databases and other important files are encrypted and have the extension: .KEYPASS The only method of recovering files is to purchase an decrypt software and unique private key. After purchase you will start decrypt software, enter your unique private key and it will decrypt all your data. Only we can give you this key and only we can recover your files. You need to contact us by e-mail email@example.com send us your personal ID and wait for further instructions. For you to be sure, that we can decrypt your files - you can send us a 1-3 any not very big encrypted files and we will send you back it in a original form FREE. Price for decryption $300. This price avaliable if you contact us first 72 hours. E-mail address to contact us: firstname.lastname@example.org Reserve e-mail address to contact us: email@example.com Your personal id: [id]