Threat Database Ransomware 'Guardware@india.com' Ransomware

'Guardware@india.com' Ransomware

By GoldSparrow in Ransomware

The 'Guardware@india.com' Ransomware is an encryption ransomware Trojan that belongs to the Crysis family of ransomware. This ransomware family has released numerous variants since Summer 2016. The 'Guardware@india.com' Ransomware carries out a typical encryption ransomware attack, encrypting the victims' files and demanding a ransom to provide the decryption key. The 'Guardware@india.com' Ransomware is being distributed through phishing email messages that use social engineering techniques to trick inexperienced computer users into opening a corrupted file attachment currently. Because of this, it is essential that computer users exercise caution when handling email attachments to avoid these threats.

The Infection Process Used by the 'Guardware@india.com' Ransomware

After the victim opens the corrupted file attachment, the 'Guardware@india.com' Ransomware will be downloaded and installed on the victim's computer. As soon as the 'Guardware@india.com' Ransomware manages to make its way into the victim's computer, it will begin to encrypt files on the affected PC. The 'Guardware@india.com' Ransomware will encrypt files on the victim's hard drive, as well as on removable memory devices and shared drives. The 'Guardware@india.com' Ransomware is designed to infect computers running the Windows operating system. Using a strong encryption algorithm, the 'Guardware@india.com' Ransomware will target image, video, audio, database, Microsoft Office, eBook, and other types of files. In fact, the 'Guardware@india.com' Ransomware will encrypt nearly 200 different file types in its attack, including the following:

.sql, .mp4, .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps, .docm, .docx, .doc, .odb, .odc, .odm, .odp, .ods, .odt.

How the 'Guardware@india.com' Ransomware Demands Its Ransom Payment

The 'Guardware@india.com' Ransomware drops a ransom note in every directory where files were encrypted. Files that were encrypted by the 'Guardware@india.com' Ransomware will be renamed, following the pattern 'filename.id-[8 random characters].guardware@india.com.xtbl.' The 'Guardware@india.com' Ransomware ransom note demands the payment of 3 BitCoin to the con artists' BitCoin wallet. This is an extraordinarily high amount compared to other ransomware Trojans (over $2200 USD!). PC security researchers strongly advise computer users to avoid paying this amount. Paying the 'Guardware@india.com' Ransomware ransom finances the activity of this ill-minded group, allowing more variants in this ransomware family to be developed. PC security researchers have also received reports that the people responsible for the 'Guardware@india.com' Ransomware attack may ignore victims, demand higher ransom payments, or deliver a decryption key that simply does not work.

Dealing with the 'Guardware@india.com' Ransomware

The best way to deal with the 'Guardware@india.com' Ransomware or other ransomware threat, is to have backups of all files. If computer users can recover by restoring their files from a backup quickly, these attacks will become obsolete. Considering the low price of storage, as well as the availability of free cloud storage services, computer users should have plenty of options available to backup their files to prevent the 'Guardware@india.com' Ransomware and other ransomware attacks.

Trending

Most Viewed

Loading...