A new ransomware known as Try2Cry is trying to worm its way onto other Windows computers by infecting USB flash drives and using Windows shortcuts (LNK files) posing as the targets’ files to lure them into infecting themselves.

The Try2Cry ransomware was discovered by G DATA malware analyst Karsten Hahn when a detection signature designed to spot USB worm components got triggered while analyzing an unidentified malware sample.

Try2Cry is a .NET ransomware and another variant of the open-source Stupid ransomware family as Hann found after analyzing a sample obfuscated with the DNGuard code protection tool.

Stupid ransomware variants are