{"id":47546,"date":"2016-02-12T12:35:15","date_gmt":"2016-02-12T20:35:15","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=47546"},"modified":"2025-06-02T01:07:33","modified_gmt":"2025-06-02T08:07:33","slug":"hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/","title":{"rendered":"HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit"},"content":{"rendered":"<p>McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/new-exploit-kits-improve-evasion-techniques\">Angler exploit kit<\/a>. HydraCrypt encrypts a victim&#8217;s files and appends the filenames with the extension &#8220;hydracrypt_ID_&lt;8 random characters&gt;.&#8221;<\/p>\n<p>The malware also drops one plain-text file on the victim\u2019s machine and opens a red window displaying the ransom screen with instructions on how to pay the ransom to decrypt the files. It also threatens to sell documents and files on the dark markes if the victim fails to take the required action within 72 hours. The ransomware screen:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47547\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.png\" alt=\"1\" width=\"605\" height=\"446\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-2.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-2-300x221.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Let\u2019s dig deeper into the\u00a0code inside the binary to understand more about it.<\/p>\n<p>This variant of HydrCcrypt is compiled with MFC. Upon execution, the malware\u00a0drops and executes its copy under the folder ChromeSettings2364 in the %AppData% directory with a random name and deletes itself. It decrypts two binaries in \u00a0memory: One of them is UPX packed and the other is an MFC-compiled executable.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47548\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2-2.png\" alt=\"2\" width=\"605\" height=\"328\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2-2.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2-2-300x163.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<p>Upon analyzing the UPX-packed binary, the malware creates a randomly named mutex to ensure that only one copy of it is running. The snippet below illustrates:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47549\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/3-2.png\" alt=\"3\" width=\"605\" height=\"168\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/3-2.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/3-2-300x83.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<p>The malware then gathers information about the victim&#8217;s machine\u2014computer name, information about locale, etc.\u2014as shown:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47550\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/4-2.png\" alt=\"4\" width=\"606\" height=\"298\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/4-2.png 606w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/4-2-300x148.png 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47551\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/5-3.png\" alt=\"5\" width=\"512\" height=\"475\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-3.png 512w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/5-3-300x278.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>The ransomware encrypts this information with RC4 code:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47552\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/6-2.png\" alt=\"6\" width=\"574\" height=\"339\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/6-2.png 574w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/6-2-300x177.png 300w\" sizes=\"auto, (max-width: 574px) 100vw, 574px\" \/><\/p>\n<p>The malware then tries to connect to the remote server d.googlex.me\u00a0on Port 30 to send the encrypted data and report the infection. The following snippet shows this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47553\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/7-1.png\" alt=\"7\" width=\"605\" height=\"250\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/7-1.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/7-1-300x124.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47554\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/8-1.png\" alt=\"8\" width=\"606\" height=\"283\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/8-1.png 606w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/8-1-300x140.png 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/p>\n<p>HydraCrypt can also download additional files from the remote server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47555\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/9-1.png\" alt=\"9\" width=\"606\" height=\"348\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/9-1.png 606w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/9-1-300x172.png 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/p>\n<p>The MFC-compiled binary, upon execution, creates a randomly named mutex, as shown below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47556\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/10-1.png\" alt=\"10\" width=\"605\" height=\"154\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/10-1.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/10-1-300x76.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<p>The malware examines\u00a0running processes on infected systems via the CreateToolhelp32Snapshot method, to check whether it is running on a virtual machine. In the following snapshot we can see the ransomware targeting code by looking for API calls such as Createtoolhelp32snapshot (taking snapshots of the specified processes, as well as the heaps, modules, and threads used by these processes), Process32First, and Process32next to find the target process.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47557\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/11-1.png\" alt=\"11\" width=\"539\" height=\"398\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/11-1.png 539w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/11-1-300x222.png 300w\" sizes=\"auto, (max-width: 539px) 100vw, 539px\" \/><\/p>\n<p>HydraCrypt drops a copy of itself under the folder ChromeSettings2364 in the %AppData% directory with a random name:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47558\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/12-1.png\" alt=\"12\" width=\"605\" height=\"229\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/12-1.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/12-1-300x114.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<p>As with old ransomware variants, HydraCrypt removes the volume shadow copies from the target\u2019s system, thereby preventing\u00a0the user from restoring the encrypted files. (Shadow copy is a Windows feature that helps users make backup copies\u2014snapshots\u2014of computer files or volumes.) To delete the shadow volume copies, HydraCrypt uses the command \u201cvssadmin.exe Delete Shadows \/All.\u201d This ransomware uses vssadmin to delete all the shadow volume copies on the computer.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47559\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/13-1.png\" alt=\"13\" width=\"606\" height=\"303\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/13-1.png 606w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/13-1-300x150.png 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-47560 aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/14-1.png\" alt=\"14\" width=\"600\" height=\"323\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/14-1.png 600w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/14-1-300x162.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>HydraCrypt tries to encrypt files with the following extensions:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47561\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/15-1.png\" alt=\"15\" width=\"534\" height=\"487\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/15-1.png 534w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/15-1-300x274.png 300w\" sizes=\"auto, (max-width: 534px) 100vw, 534px\" \/><\/p>\n<p>Finally, it creates the file README_DECRYPT_HYDRA_ID_XXXXXXXX in the %Desktop% directory\u00a0and displays it\u00a0on\u00a0the victim\u2019s screen:<\/p>\n<ul>\n<li>README_DECRYPT_HYDRA_ID_XXXXXXXX<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-47562\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/16-1.png\" alt=\"16\" width=\"606\" height=\"292\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/16-1.png 606w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/16-1-300x145.png 300w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/p>\n<h2><strong>MD5s:<\/strong><\/h2>\n<ul>\n<li>08B304D01220F9DE63244B4666621BBA<\/li>\n<li>31fa6b1b3e03270f90103d95ef84a010<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>McAfee advises users to keep their antimalware signatures up to date at all times. McAfee products detect this variant of ransomware as Ransom-Hydracrypt with DAT Versions 8074 and later.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the\u00a0Angler&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,142,180],"coauthors":[3973],"class_list":["post-47546","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-tag-identity-theft","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit | McAfee Blog<\/title>\n<meta name=\"description\" content=\"McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the\u00a0Angler\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the\u00a0Angler\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-12T20:35:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T08:07:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"605\" \/>\n\t<meta property=\"og:image:height\" content=\"446\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit\",\"datePublished\":\"2016-02-12T20:35:15+00:00\",\"dateModified\":\"2025-06-02T08:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/\"},\"wordCount\":524,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.png\",\"keywords\":[\"computer security\",\"cybercrime\",\"identity theft\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/\",\"name\":\"HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.png\",\"datePublished\":\"2016-02-12T20:35:15+00:00\",\"dateModified\":\"2025-06-02T08:07:33+00:00\",\"description\":\"McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the\u00a0Angler\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit | McAfee Blog","description":"McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the\u00a0Angler","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit | McAfee Blog","og_description":"McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the\u00a0Angler","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-02-12T20:35:15+00:00","article_modified_time":"2025-06-02T08:07:33+00:00","og_image":[{"width":605,"height":446,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/1-2.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit","datePublished":"2016-02-12T20:35:15+00:00","dateModified":"2025-06-02T08:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/"},"wordCount":524,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.png","keywords":["computer security","cybercrime","identity theft","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/","name":"HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.png","datePublished":"2016-02-12T20:35:15+00:00","dateModified":"2025-06-02T08:07:33+00:00","description":"McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the\u00a0Angler","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/1-2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hydracrypt-variant-of-ransomware-distributed-by-angler-exploit-kit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"HydraCrypt Variant of Ransomware Distributed by Angler Exploit Kit"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=47546"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47546\/revisions"}],"predecessor-version":[{"id":214806,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47546\/revisions\/214806"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=47546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=47546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=47546"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=47546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}