You can check the latest ransomware information.
[ Eternity ransomware ]
[Virus/Malware Activity Report: Eternity Ransomware]
In response to a breach believed to be in the form of Eternity ransomware,
we would like to confirm the situation and provide a warning as follows.
Eternity Ransomware
The ransomware in question is called Eternity and appears to be changing all files with the extension .ecrp.
How it works
file version
[Figure 1 File version]
[Figure 2 File properties]
behavioral process
Disable task manager
Disable Task Manager using Windows security policy.
[Figure 3 Disable task manager]
network test
Check the communication status using the ping command.
[Figure 4 Network test]
Task Scheduler Reservation
Create a scheduled task so that Eternity ransomware can run periodically.
[Figure 5 Task Scheduler Reservation]
Deleting shadow copies
Delete all shadow copies to make recovery of encrypted data difficult.
[Figure 6 Deleting shadow copies]
Infection results
Ransomware copies itself into %AppData%LocalServiceHub and operates after deleting the files in the location where it was first executed. The information file is processed in a way that the ransomware exe directly displays the GUI, and when encryption is performed, the files are changed to <.existing extension.ecrp>.
[Figure 7 Infection result 1]
[Figure 8 Infection result 2]
[Figure 9 Infection result 3]
White Defender compatible
It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.
[Figure 10 Block message]
[Figure 11 Block message]