Threat Database Ransomware AttackFiles Ransomware

AttackFiles Ransomware

Researchers have uncovered a ransomware threat known as AttackFiles. This detrimental software encrypts the data of its victims using a robust encryption algorithm, rendering it inaccessible. Subsequently, the attackers demand payment from both organizations and individuals in exchange for restoring access to the encrypted data.

When AttackFiles infiltrates a device, it encrypts specific file types and appends a '.attackfiles' extension to their names. For instance, a file named '1.png' would appear as '1.png.attackfiles,' and '2.pdf' as '2.pdf.attackfiles,' and so on.

After completing the encryption process, AttackFiles generates a ransom note named 'How_to_back_files.html.' This note refers to the infected system as a 'company network,' indicating that the primary targets are organizations rather than individual users. Additionally, researchers have identified AttackFiles as a variant belonging to the MedusaLocker Ransomware family.

The AttackFiles Ransomware Takes the Files of Its Victims' Hostage

The ransom message from AttackFiles informs the victim that their company network has been breached, resulting in the encryption of files using RSA and AES cryptographic algorithms. Additionally, sensitive and personal data has been stolen during the attack.

To recover access to the encrypted files, the victim is required to pay a ransom. If the victim refuses to comply, the attackers threaten to leak or sell the exfiltrated content. Before committing to paying the ransom, the victim is offered the option to test decryption on a small number of files (usually 2-3) for free. However, the note also cautions against actions that could lead to permanent data loss.

Researchers caution that decryption without the involvement of the attackers is typically impossible, except in cases where the ransomware has significant flaws. Furthermore, even after paying the ransom, victims often do not receive the decryption tools. Therefore, experts advise against giving in to the demands of cybercriminals, as transferring money to them supports their illegal activities.

Preventing further encryption by AttackFiles requires removing the ransomware from the operating system. However, it's important to note that removing the ransomware does not automatically restore access to already encrypted files.

Make Sure to Safeguard Your Data and Devices against Ransomware Threats

Protecting data and devices against ransomware threats demands a proactive approach and the use of best practices in cybersecurity. Here's how users can safeguard their data and devices:

  • Keep Software Updated: Regularly update operating systems, software applications and security programs. Updates often deliver patches for known vulnerabilities that ransomware exploits.
  •  Use Strong Passwords: Set up complex passwords and change them periodically. Avoid using easily guessable passwords and consider implementing multi-factor authentication where possible.
  •  Be Cautious with Email: Always be careful when opening attachments or clicking on links, especially from unknown sources. Phishing emails are a common method for ransomware delivery.
  •  Backup Data Regularly: Implement a robust backup strategy that includes creating regular backups of essential data to an external device or cloud storage. This guarantees that data can be restored in the event of a ransomware attack.
  •  Limit User Privileges: Restrict user permissions to only those necessary for their roles. This can help mitigate the spread of ransomware across a network if one user account is compromised.
  •  Enable Security Features: Empower security features such as firewalls, intrusion detection systems, and endpoint protection software. These tools can help uncover and prevent ransomware infections.
  •  Educate Users: Provide training and awareness programs for users to recognize the signs of ransomware attacks, such as suspicious emails or unexpected file encryption.
  •  Monitor Network Activity: Regularly monitor network traffic and system logs for signs of unusual activity that may indicate a ransomware infection.

By following these practices, users can significantly avoid the risk of tumbling victim to ransomware attacks and protect their data and devices from being compromised.

The ransom note generated by the AttackFiles Ransomware reads:

'YOUR PERSONAL ID:

/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\
All your important files have been encrypted!

Your files are safe! Only modified. (RSA+AES)

ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE
WILL PERMANENTLY CORRUPT IT.
DO NOT MODIFY ENCRYPTED FILES.
DO NOT RENAME ENCRYPTED FILES.

No software available on internet can help you. We are the only ones able to solve your problem.

We gathered highly confidential/personal data. These data are currently stored on a private server. This server will be immediately destroyed after your payment.
If you decide to not pay, we will release your data to public or re-seller.
So you can expect your data to be publicly available in the near future..

We only seek money and our goal is not to damage your reputation or prevent
your business from running.

You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back.

Contact us for price and get decryption software.

email:
crypt2024_tm123@outlook.com
crypt2024_tm123@outlook.com

To contact us, create a new free email account on the site: protonmail.com
IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER'

Trending

Most Viewed

Loading...