'Grapn206@india.com' Ransomware
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 10 % (Normal) |
Infected Computers: | 8 |
First Seen: | November 28, 2016 |
Last Seen: | June 23, 2022 |
OS(es) Affected: | Windows |
The 'Grapn206@india.com' Ransomware is a variant of the infamous Globe Ransomware family, a large group of ransomware that has been responsible for numerous attacks in the months of Fall 2016. Files affected by the 'Grapn206@india.com' Ransomware will have this email address added to the end of their file name as an extension. If the 'Grapn206@india.com' Ransomware has been installed on your computer, it will be necessary to remove it with the help of a reliable security program and then take steps to restore the affected files from a backup copy or using the available decryption tool.
The 'Grapn206@india.com' Ransomware Attack
The 'Grapn206@india.com' Ransomware is designed to extort money from the victim. To do this, the 'Grapn206@india.com' Ransomware takes the victim's files hostage, encrypting them and then demanding the payment of a large ransom. In most cases, the 'Grapn206@india.com' Ransomware is distributed using a corrupted spam email attachment, which downloads and installs the 'Grapn206@india.com' Ransomware onto the victim's computer.
The 'Grapn206@india.com' Ransomware is installed in one of the following directories (depending on the variant of this attack being used):
%AppData%
%Roaming%
%Local%
%LocalRow%
%Windows%
%System%
%System32%
%Temp%
The 'Grapn206@india.com' Ransomware's executable file will have an innocuous name that makes it appear as a legitimate Windows file. During its attack, the 'Grapn206@india.com' Ransomware will scan the victim's hard drives and search for certain file types. The 'Grapn206@india.com' Ransomware encrypts these files using a strong encryption algorithm. The following are among the file types that may be targeted during the 'Grapn206@india.com' Ransomware attack:
PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG.
After encrypting the victim's files, the 'Grapn206@india.com' Ransomware demands the payment of a ransom. To do this, the 'Grapn206@india.com' Ransomware displays a message instructing the victim to contact this email address for further instructions. Ransomware like the 'Grapn206@india.com' Ransomware demands the payment of ransoms that vary between 0.5 and 1.5 BitCoins (approximately $300 to $900 USD at the current exchange rate). Of course, paying these amounts to recover from a threat attack is unacceptable to almost all computer users.
Dealing with the 'Grapn206@india.com' Ransomware Attack
PC security analysts advise computer users to remove the 'Grapn206@india.com' Ransomware threat before attempting to recover the files. Ignore the 'Grapn206@india.com' Ransomware's ransom demands, especially because this is one of the rare ransomware variants under distribution for which a decryption utility is available currently. The 'Grapn206@india.com' Ransomware can be removed with a reliable security program that is fully up to date easily. Once the 'Grapn206@india.com' Ransomware has been removed, computer users should have a backup copy of each encrypted file if they will attempt decryption with the decryption utility that is available currently. In most cases, the best results will be achieved by simply replacing the encrypted files with backup copies. Because of this, having backups of all files is the beast measure to prevent ransomware Trojan attacks. This is especially true for other ransomware families since there are no decryption methods available for many of these attacks currently.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.