Crooks use seemingly harmless help files to serve CryptoWall ransomware

Experts at Bitdefender revealed that crooks used seemingly harmless help files to distribute a variant of the popular ransomware CryptoWall.

The cybercrime never ceases to surprise, every time we discuss a new and effective technique to deceive victims and evade detection mechanisms. Security experts at Bitdefender have discovered a new spam campaign that targeted a few hundred users. Bad actors sent email messages containing a bogus “Incoming Fax Report” that carried a help file with the .chm (compiled HTML) extension.

When victims opened the file, they were presented with a help window, meanwhile a strain of malware in background downloaded the popular CryptoWall ransomware and executed it. Bitdefender detected the ransomware variant as Trojan.GenericKD.217093.

The spam campaign targeted users worldwide, including in the United States, Europe and Australia.

The CryptoWall ransomware is one of the most popular malicious code used in the cybercriminal ecosystem for extortion. Ransomware is a specific family of malware that lock victims’ files and requests the payment of a fee to unlock them. CryptoWall uses public-key cryptography to encrypt files with certain extensions.

According the experts of Dell SecureWorks, in August 2014 the number of CryptoWall infections in the previous six months was 600,000, producing gains for $1 million in ransoms, the victims paid a fee ranging from $100 to $500.

The last variant of CryptoWall, CryptoWall 3.0, uses I2P to hide its command and control infrastructure. The threat actors behind the last campaign used servers located in Vietnam, India, the US, Australia, Spain and Romania to send out the spam emails.

Bitdefender provides the CryptoWall Vaccine, to protect systems against the popular ransomware by blocking file encryption attempts.

“We have now developed a vaccine that allows users to immunize their computers and block any file encryption attempts, even if they become infected with CryptoWall, one of the most powerful clones of the Cryptolocker malware.” reports Bitdefender.

In the specific campaign, the attackers used seemingly harmless help files (CHM files) that can run JavaScript code.

“These CHM files are highly interactive and run a series of technologies including JavaScript, which can redirect a user toward an external URL after simply opening the CHM,” Bitdefender said. “Attackers began exploiting CHM files to automatically run malicious payloads once the file is accessed. And it makes perfect sense: the less user interaction, the greater the chances of infection.”

Security experts believe that the campaign was mainly targeted for corporate users because the nature of the bogus document used by the spam messages, a fake fax email.

Pierluigi Paganini

(Security Affairs –  CryptoWall, ransomware)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

19 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.