New Mimic ransomware can hold your files for hostage fast

Man looking at a locked computer
(Image credit: Shutterstock)

A new ransomware strain is making the rounds online that can encrypt your files even faster than most, as it uses a popular third-party Windows search tool to know exactly what to look for.

First discovered back in June of last year by Trend Micro, this new ransomware strain has been dubbed Mimic based on a string the company’s security researchers found in its binaries. According to a new report, the Mimic ransomware is so far primarily being used to target Russian- and English-speaking users.

Interestingly enough, BleepingComputer points out that some of the code found in Mimic shares similarities with the Conti ransomware. This is likely due to the fact that Conti’s source code was leaked back in March 2022 by a Ukrainian researcher after its creators sided with Russia.

The Mimic ransomware is currently being spread through executable files (.exe) that are sent to targeted victims via email. Once opened, the executable extracts its malicious payload along with tools that are used to disable Windows Defender on a victim’s computer.

Mimic has quite a few tricks up its sleeve to help speed up the process of encrypting a victim’s files .including using multiple processor threats and command line arguments to narrow file targeting.

Everything Windows search tool

What makes Mimic much faster and more efficient than previous ransomware strains is how it uses the “Everything” search tool to locate files to hold hostage. Developed by Voidtools, Everything is a filename search engine for Windows that is much more efficient and faster than Windows Search.

By using Everything on a targeted system, Mimic is able to locate files that can be encrypted, like documents, while avoiding system files that would prevent a computer from turning on in the first place if locked.

A ransom note left on a PC infected with the Mimic ransomware

(Image credit: Tom's Guide/Trend Micro)

Files encrypted by the Mimic ransomware are given the “.QUIETPLACE” extension and a ransom note named “Decrypt_me.txt” is dropped somewhere on a user’s system. This ransom note explains that victims need to pay the attackers in Bitcoin to have their files unencrypted. However, it also says that the attackers can decrypt just some of a victim’s most important files for the price of “1 file = 1$”. This might be worth it for victims if they only need a few files from their locked system and were planning on upgrading to a new PC anyways.

This is the first time we’ve seen a ransomware strain use a popular third-party tool to speed up the encryption process. The Everything search tool doesn’t even need to be installed on a victim’s machine, as it’s included in the malicious executable used to infect a PC with Mimic in the first place.

How to stay safe from ransomware

Cloud computing and communication concept.

(Image credit: Who is Danny / Shutterstock)

Just like with malware and other viruses, you should avoid opening attachments in emails from unknown senders to stay safe from ransomware. Likewise, you shouldn’t download illegal software or download any file from sites without a proven reputation.

The best antivirus software can also detect many types of ransomware before your system is infected. However, antivirus software isn’t able to unlock your files once they’ve been locked by an attacker using ransomware. For this reason, it pays to use the best cloud storage to keep an extra copy of your most important files stored safely in the cloud and the best cloud backup services may be an even better choice as it backs up your files automatically.

If you do fall victim to ransomware, this step-by-step guide can walk you through the process of getting your files back. At the same time, Bitdefender and other cybersecurity firms often release ransomware decryption tools like it did for the Darkside ransomware. This way, even if you don’t have the money or don’t want to pay a ransom to cybercriminals, there’s still a chance you may be able to recover your files someday.

As for the Mimic ransomware, it’s a relatively new strain and we don’t know that much about how it’s being used in attacks or who’s behind it yet. Hopefully we find out more soon.

TOPICS
Anthony Spadafora
Managing Editor Security and Home Office

Anthony Spadafora is the managing editor for security and home office furniture at Tom’s Guide where he covers everything from data breaches to password managers and the best way to cover your whole home or business with Wi-Fi. He also reviews standing desks, office chairs and other home office accessories with a penchant for building desk setups. Before joining the team, Anthony wrote for ITProPortal while living in Korea and later for TechRadar Pro after moving back to the US. Based in Houston, Texas, when he’s not writing Anthony can be found tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Read more
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
A hacker typing quickly on a keyboard
New MassJacker malware is hijacking digital wallets to steal large sums from users
Mobile malware
New malware uses infected VPN apps to take over your device — here's how to stay safe
Malware
New macOS malware uses Apple's own code to quietly steal credentials and personal data — how to stay safe
An FBI agent typing on a computer
FBI issues warning to millions of Americans to avoid these websites that can steal your passwords and banking info
and image of the Google Chrome logo on a laptop
Google Docs under attack from info-stealing malware — how to keep your data and your emails safe
Latest in Malware & Adware
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Malware
Dangerous new password-stealing trojan automatically reinstalls itself on infected PCs
An FBI agent typing on a computer
FBI issues warning to millions of Americans to avoid these websites that can steal your passwords and banking info
A hacker typing quickly on a keyboard
New MassJacker malware is hijacking digital wallets to steal large sums from users
A person trying to set up a new Wi-Fi router
Thousands of TP-Link routers have been infected by a botnet to spread malware
A smartphone screen displaying the Android name and logo next to a sign reading 'MALWARE'.
Fake Google Play Store pages are spreading Trojan malware that can steal your financial data
Latest in News
Apple Watch Ultra 2
Apple Watch Ultra 3 just tipped for two major upgrades
NYTimes Connections
NYT Connections today hints and answers — Tuesday, March 25 (#653)
A first look at Amazon's Fallout TV series coming to Prime Video
‘Fallout’ season 3 plans are reportedly being made — while season 2 is still filming
Surface Laptop 7 from the front
Amazon just gave Surface Laptop 7 a 'frequently returned' label — here's what's going on
New emojis with iOS 18.4 beta release.
iOS 18.4 beta brings 8 new emoji to your iPhone — here's all the new options
23andME box
23andMe has declared bankruptcy — here's how to delete your data now