Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Ransomware Roundup: Cryptonite Ransomware

November 29, 2022

After Cryptonite has been executed, It actively checks for internet connections and stops execution if non are detected. If an Internet connection is active and established, it encrypts the targeted system. Later, encrypted file extensions are changed to ".cryptn8" by default. After identifying the IP address using "ipinfo.io", It connects to "ngrok.io" to pass the victim's details back to the attacker. Finally, a ransomware window is shown on the victim's machine with a box where the victim can enter the key and instructions on how to obtain it.