You can check the latest ransomware information.
[ Eternity ransomware ]
[Virus/Malware Activity Report: Eternity Ransomware]
In response to a breach believed to be in the form of Eternity ransomware, 
  we would like to confirm the situation and provide a warning as follows.
Eternity Ransomware
The ransomware in question is called Eternity and appears to be changing all files with the extension .ecrp.
How it works
file version
 

[Figure 1 File version]
 
 

[Figure 2 File properties]
 
behavioral process
Disable task manager
Disable Task Manager using Windows security policy.
 

[Figure 3 Disable task manager]
 
network test
Check the communication status using the ping command.
 

[Figure 4 Network test]
 
Task Scheduler Reservation
Create a scheduled task so that Eternity ransomware can run periodically.
 

[Figure 5 Task Scheduler Reservation]
 
Deleting shadow copies
Delete all shadow copies to make recovery of encrypted data difficult.
 

[Figure 6 Deleting shadow copies]
 
Infection results
Ransomware copies itself into %AppData%LocalServiceHub and operates after deleting the files in the location where it was first executed. The information file is processed in a way that the ransomware exe directly displays the GUI, and when encryption is performed, the files are changed to <.existing extension.ecrp>.
 

[Figure 7 Infection result 1]
 
 

[Figure 8 Infection result 2]
 
 

[Figure 9 Infection result 3]
 
White Defender compatible
It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.
 
[Figure 10 Block message]
 
[Figure 11 Block message]
