Flotera Ransomware
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 80 % (High) |
Infected Computers: | 399 |
First Seen: | March 27, 2017 |
Last Seen: | July 19, 2022 |
OS(es) Affected: | Windows |
The Flotera Ransomware is a ransomware Trojan that seems to be related to the Polski Ransomware. The Flotera Ransomware was developed using an open source file encryption resource named AESxWin. Once the Flotera Ransomware enters a computer, it encrypts the victim's files using the AES-256 encryption. Once the Flotera Ransomware has finish encrypting the files, they will have the file extension '.aes' added to the end of the files' names. The Flotera Ransomware creates a text file named '!!!-ODZYSKAJ-DANE-!!!.TXT,' which is dropped on the infected computer's Desktop. This file warns the victim to pay a ransom to recover the affected files.
The Threat Used by the Flotera Ransomware to Force PC Users to Pay Its Ransom Quickly
The Flotera Ransomware's ransom note is written in Polish, and will not be readable for computer users that are not Polish speakers. It seems clear that the Flotera Ransomware is designed to target computers in Poland, although it also will encrypt files on computers located elsewhere. The only way to recover the affected files is using a decryption key, which the con artists control. Victims are asked to contact the people responsible for the attack via email and pay $199 USD in exchange for the decryption key. Apart from this, the ransom note claims that the ransom will be doubled after four days. Victims are invited to send two files for the criminals prove that they can decrypt the files. However, PC security researchers strongly advise against contacting these people or paying the ransom. It is common for computer users that are victims of these attacks to be deceived further. Unfortunately, recovering the files affected by the Flotera Ransomware may not be possible, except by deleting them and replacing them with a file backup entirely.
The Flotera Ransomware can be identified easily due to its characteristic ransom note written in Polish, which contains the following text:
'@@@@@@@@@@@@@@@@@@@@@
Ŧ l ๏ t є г ค г ค ภ ร ๏ ๓ ฬ ค г є
@@@@@@@@@@@@@@@@@@@@@
######################################################################
Nie możesz znaleźć potrzebnych plików na dysku twardym ? Zawartość Twoich plików jest nie do otwarcia?
Jest to skutek działania programu który zaszyfrował większość Twoich danych przy pomocy silnego alogrytmu AES-256
używanego min. przez służby mundurowe do zatajania danych przesyłanych drogą elektroniczną.
Jedyna metoda aby odzyskać Twoje pliki to wykupienie od nas programu deszyfrującego, wraz z jednorazowym kluczem wygenerowanym unikalnie dla Ciebie!
########################################################################
W momencie gdy to czytasz całość jest już ukończona, wytypowane pliki zostały zaszyfrowane a sam wirus usunięty z Twojego komputera.
Klucz składający się z kilkudziesięciu znaków potrzebny do odszyfrowania danych z dysku znajduje się w miejscu dostępnym tylko dla nas !
Możesz w nieskończoność próbować instalacji kolejnych programów antywirusowych, Formatować system operacyjny to jednak nic nie zmieni !
Jeśli nie zastosujesz się do naszych instukcji nie odzyskasz plików które były na dysku HDD.
########################################################################
Gdy już postanowisz odzyskać swoje dane wyślij wiadomość pod obydwa adresy e-mail: flotera@2.pl oraz flotera@protonmail.ch
Możesz też napisać na Gadu-Gadu: 62206321
2 Pliki odszyfrujemy za darmo aby udowodnić że jesteśmy w stanie tego dokonać, Za resztę niestety musisz zapłacić !
Cena za odszyfrowanie wszystkich plików: 199$
Uwaga ! Nie marnuj czasu, czas to pieniądz za 4 dni cena wzrośnie o 100 % !'
Protecting Your Computer from Threats Like the Flotera Ransomware
The best protection against threats like the Flotera Ransomware is to have file backups. Apart from having backups of all files on an external device or the cloud, PC security researchers also advise computer users to use a strong anti-malware program to scan their computers regularly and intercept threats like the Flotera Ransomware before they manage to enter the computer. Threats like the Flotera Ransomware may be delivered through corrupted spam email attachments. Because of this, learning to recognize these corrupted emails, handle emails securely, and having a reliable anti-spam filter are all essential parts of protecting your computer from threats like the Flotera Ransomware.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.