<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img class="alignnone size-full wp-image-1495 aligncenter" src="http://cdn2.hubspot.net/hubfs/2548414/Imported_Blog_Media/laptop-lock-1.jpg" alt="laptop-lock-1" width="360" height="240">Chuingam, also called Xwin, is a new ransomware that is distributed via email containing a file attachment about "payment transfers." The file has a .cmd extension and is actually just an executable, so when the victim opens the file they get an error window and the malware starts downloading itself onto the computer.</p> <!--more--><p>In order to evade detection, Chuingam waits until the computer goes into sleep mode to archive the victim's files and add a password. Unlike many other ransomware variants, there is no actual encryption going on. After this is done, it shows the victim a ransom note, asking for 300 Euros to "decrypt" the files.</p> <p>ThreatSTOP customers are protected against Chuingam.</p></span>