Larry Abrams had the scoop: "A new ransomware has been spotted called 7ev3n that encrypts your data and demands 13 bitcoins to decrypt your files. A 13 bitcoin [almost $5,000] ransom demand is the largest we have seen to date for this type of infection, but that is only just one of the problems with this ransomware.
In addition to the [stupid] large ransom demand, the 7ev3n crypto-ransom malware also does a great job trashing the Windows system that it was installed on. It does this by modifying a variety of system settings and boot options so that keyboard keys and system recovery options are disabled on the computer. So between a victim's files being encrypted and the computer being trashed so you can't bypass the lock screen, it makes for a very frustrating experience." Here is how the ransom note looks:
What To Do About It:
It is still in the early days, at the moment there is no known way to decrypt the files for free, but if malware researchers reverse engineer the code and find a way to get your files back, we will let you know.
Your best protection remains a solid and proven backup strategy, with regular off-site copies.
For mitigation purposes, treat this like any other ransomware. Continue blocking executables from running from standard paths (%appdata%, %temp%, etc). There are dedicated anti-ransomware tools out there now. For instance, check WinAntiRansom and Malwarebytes Anti-Ransom.
Stepping your users through effective security awareness training is a must these days. Find out affordable this is for your organization and be pleasantly surprised.