<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><img class="alignnone size-full wp-image-1387" src="http://cdn2.hubspot.net/hubfs/2548414/Imported_Blog_Media/hydra.jpg" alt="hydra" width="640" height="360">HydraCrypt is a new ransomware recently discovered by McAfee. Like some previous ransomware variants, HydraCrypt is distributed using the Angler exploit kit. HydraCrypt encrypts a victim’s files and appends the filenames with the extension “hydracrypt_ID_&lt;8 random characters&gt;”.</p> <!--more--><p>The malware also drops one plain-text file on the victim’s machine and opens a red window displaying the ransom screen with instructions on how to pay the ransom, then decrypt the files. If the victim fails to take the required action within 72 hours, HydraCrypt threatens to sell the documents and files on the dark market.</p> <p>ThreatSTOP customers are protected from HydraCrypt.</p></span>