Technical Breakdown:
1. File Extension & Renaming Patterns
The suffix encrypted_backup
appearing after a file’s original name (e.g., Invoice_12.pdf.encrypted_backup
) is NOT a static, trademarked extension unique to a single ransomware family.
It is generated by off-the-shelf “builder” kits such as:
- Hidden Tear / Hidden Tear-Spinoffs
- Apocalypse / Al-Namrof / Esmeralda variants
- some PowerShell-based “for-education” lockers
- competition-CTF or hobbyist kits (“Ransom0”, “Ransom-1h”, etc.)
Because the same string can be produced by several disparate malware binaries, attribution must be confirmed with ransom-note name / hash / network IoCs (see § 2).
Renaming Convention:
[original basename] [optional counter] .encrypted_backup
Letters are always lower-case; no e-mail address or random ID is embedded in the filename itself.
2. Detection & Outbreak Timeline
First recorded mass sightings:
- 2016-Q2 – Hidden Tear “github clones” used in e-mail spam campaigns targeting Italian SMEs.
- 2017-Q1 – Apocalypse branch spreads via RDP brute-force; files appended with “encrypted_backup”.
- 2018-Q4 – PowerShell-based “BadTear” uses the same extension against exposed SMB (EternalBlue patched but re-enabled via GPO).
- 2021-Q3 – Hobbyist kit returned in small-volume “pentester wannabe” incidents; correlates with CVE-2021-34527 (PrintNightmare) exploitation.
The extension therefore spans multiple code-bases across five years; always triage the ransom note (usually README_TO_RESTORE.txt
, HOW_TO_DECRYPT.hta
, or __$$RECOVER__$$.html
) to establish the exact family.
3. Primary Attack Vectors
-
E-mail phishing → weaponised Office docs with malicious macros (
Invoice_12-05.docm
). - RDP / VNC brute forcing → manual drop of payload once inside.
-
Exploitation of un-patched Windows:
– EternalBlue (MS17-010)
– BlueKeep (CVE-2019-0708)
– PrintNightmare (CVE-2021-34527 & 34533) -
Legitimate pentest frameworks gone rogue (
Invoke-ReflectivePEInjection
,Cobalt-Strike beacons
) that then side-load the encryptor DLL. -
Insecure file-shares: attacker uploads the executable and schedules it with
schtasks
or WMI.
Remediation & Recovery Strategies:
1. Prevention
☑ Apply 2023-08 cumulative Windows patches (includes fixes for PrintNightmare, SMB, and RCEs).
☑ Disable SMBv1 at the organisational level (via Group Policy or PowerShell Disable-WindowsOptionalFeature
).
☑ Enforce Network Level Authentication (NLA) on all RDP endpoints; use 2-factor (Azure MFA, Duo, etc.).
☑ Segment VLANs: high-value backups isolated with ACL “deny all inbound” except from dedicated backup service account.
☑ Macro controls: block internet macros automatically (Office 365 “Block Office applications from creating executable content”).
☑ E-mail hygiene: attachment sandboxing (MS Defender for Office 365, Proofpoint, Mimecast).
☑ Principle of Least Privilege + LAPS for local admin passwords.
☑ Immutable / offline backups (Veeam Hardened Repository, AWS S3 Object-Lock, Azure Immutable Blob).
☑ Application whitelisting (WDAC / AppLocker) preventing unsigned binaries in user-writeable paths (%APPDATA%
, %TEMP%
).
2. Removal
a. Disconnect from network immediately (pull cable / disable Wi-Fi).
b. Power-off unrelated machines to avoid lateral SMB or PSExec spread.
c. Collect volatile memory dump for forensics if possible (winpmem
, Magnet RAM
).
d. Boot a clean Windows PE / Linux live-disk; mount the OS volume read-only:
1) Identify the main payload (*.exe
or *.dll
) often in %TEMP%
, %APPDATA%\Roaming\[random4]
, or C:\PerfLogs
.
2) Remove persistence entries in HKLM\Software\Microsoft\Windows\CurrentVersion\Run
, RunOnce
, TaskScheduler
.
3) Delete dropped copies; empty Prefetch
, C:\Windows\Temp
, user Temp
folders.
e. Run up-to-date AV/AM (Defender, ESET, Kaspersky, Sophos) with cloud heuristic ON; most vendors detect Hidden-Tear and Apocalypse generically as Ransom.HiddenTear.*
or Ransom.APH.*
.
f. Re-image if feasible (fastest & cleanest) or run DISM/SFC to verify system file integrity.
3. File Decryption & Recovery
Hidden Tear–lineage uses AES-128 in CBC mode with a randomly generated 16-byte key per file; the key list is RSA-encrypted with a 2048-bit attacker public key and stored in %ProgramData%\key.dat
. No private key = offline decryption impossible.
HOWEVER the early Apocalypse / Esmeralda fork reused a static or hard-coded RSA private key.
Check your ransom note:
-
Note says “Email me at [email protected] / [email protected]“
– You are in luck; a free decrypter exists.
– Download ESET’s “ApocalypseDecryptor” or use “Al-Namrof Decrypter” (Trend Micro) – runs on Windows 7–11.
– Supply an unencrypted copy of one file (>2 KB) plus its encrypted twin; tool brute-forces the key within minutes. -
Note uses “anon” proton-mail or no mail at all; note counsels you to visit a TOR site with a user-ID string
– Likely a modern variant with unique RSA key pair → pay or restore from backup only. -
Encrypted by a “proof-of-concept” Hidden Tear sample compiled without modification
– Because the author’s RSA public key was embedded, free decrypters (G-data, Nomoreransom) can unlock them.
– Upload one encrypted file + ransom note to https://www.nomoreransom.org to receive an online checker; if green, it auto-builds the decryptor.
No public decryptor = last hope is cloud shadow copies or 3rd-party file recovery (Recuva, PhotoRec) if the malware deleted them incorrectly.
4. Other Critical Information
Distinguishing characteristics:
- Extension alone is ambiguous; always correlate with IoCs in the ransom note and with dropped mutexes (
HIDDEN_TEAR
,APOCALYPSE_MUTEX
,local\hsdfjklhvkjhejrl
). - Older Hidden Tear binaries use a self-deletion routine but forget to clear Windows Error Reporting logs; inspect
WER\ReportQueue
for leftover crash dumps containing the executable. - Many versions leave a verbose log in
%TEMP%\mylog.txt.tmp
that lists which folders were processed—useful to verify completeness of encryption.
Broader impact / lessons learned:
- Served as “entry-level” ransomware—source code still referenced in undergrad security courses; hence perpetual re-appearance.
- Demonstrates that even weak, poorly-coded lockers can disable a small business if backups are on-line and RDP is exposed.
- Reinforces need for layered defences: patch, segment, 2FA, immutable backups, and tested restore drills.
Quick Reference (TL;DR)
- Extension does NOT unambiguously identify a single family; use the ransom note or hash to be sure.
- Free decryption tools are available only for the Apocalypse / early Hidden Tear versions linked above.
- Patch EternalBlue & PrintNightmare, disable SMBv1, protect RDP, keep offline backups.
- If hit, isolate, triage, delete persistence, try nomoreransom checker, rebuild.
Stay safe, patch promptly, and—most importantly—maintain verified, offline backups.