Threat Database Ransomware 'Grapn206@india.com' Ransomware

'Grapn206@india.com' Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 10 % (Normal)
Infected Computers: 8
First Seen: November 28, 2016
Last Seen: June 23, 2022
OS(es) Affected: Windows

The 'Grapn206@india.com' Ransomware is a variant of the infamous Globe Ransomware family, a large group of ransomware that has been responsible for numerous attacks in the months of Fall 2016. Files affected by the 'Grapn206@india.com' Ransomware will have this email address added to the end of their file name as an extension. If the 'Grapn206@india.com' Ransomware has been installed on your computer, it will be necessary to remove it with the help of a reliable security program and then take steps to restore the affected files from a backup copy or using the available decryption tool.

The 'Grapn206@india.com' Ransomware Attack

The 'Grapn206@india.com' Ransomware is designed to extort money from the victim. To do this, the 'Grapn206@india.com' Ransomware takes the victim's files hostage, encrypting them and then demanding the payment of a large ransom. In most cases, the 'Grapn206@india.com' Ransomware is distributed using a corrupted spam email attachment, which downloads and installs the 'Grapn206@india.com' Ransomware onto the victim's computer.

The 'Grapn206@india.com' Ransomware is installed in one of the following directories (depending on the variant of this attack being used):

%AppData%
%Roaming%
%Local%
%LocalRow%
%Windows%
%System%
%System32%
%Temp%

The 'Grapn206@india.com' Ransomware's executable file will have an innocuous name that makes it appear as a legitimate Windows file. During its attack, the 'Grapn206@india.com' Ransomware will scan the victim's hard drives and search for certain file types. The 'Grapn206@india.com' Ransomware encrypts these files using a strong encryption algorithm. The following are among the file types that may be targeted during the 'Grapn206@india.com' Ransomware attack:

PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG.

After encrypting the victim's files, the 'Grapn206@india.com' Ransomware demands the payment of a ransom. To do this, the 'Grapn206@india.com' Ransomware displays a message instructing the victim to contact this email address for further instructions. Ransomware like the 'Grapn206@india.com' Ransomware demands the payment of ransoms that vary between 0.5 and 1.5 BitCoins (approximately $300 to $900 USD at the current exchange rate). Of course, paying these amounts to recover from a threat attack is unacceptable to almost all computer users.

Dealing with the 'Grapn206@india.com' Ransomware Attack

PC security analysts advise computer users to remove the 'Grapn206@india.com' Ransomware threat before attempting to recover the files. Ignore the 'Grapn206@india.com' Ransomware's ransom demands, especially because this is one of the rare ransomware variants under distribution for which a decryption utility is available currently. The 'Grapn206@india.com' Ransomware can be removed with a reliable security program that is fully up to date easily. Once the 'Grapn206@india.com' Ransomware has been removed, computer users should have a backup copy of each encrypted file if they will attempt decryption with the decryption utility that is available currently. In most cases, the best results will be achieved by simply replacing the encrypted files with backup copies. Because of this, having backups of all files is the beast measure to prevent ransomware Trojan attacks. This is especially true for other ransomware families since there are no decryption methods available for many of these attacks currently.

Trending

Most Viewed

Loading...