Threat Database Ransomware 'Okean-1955@india.com' Ransomware

'Okean-1955@india.com' Ransomware

By GoldSparrow in Ransomware

The 'Okean-1955@india.com' Ransomware is part of a large family of ransomware threats that identify files they encrypt with the extension XTBL. PC security analysts have pointed out that there is currently no decryptor available for the 'Okean-1955@india.com' Ransomware, making it particularly threatening to computer users. The 'Okean-1955@india.com' Ransomware is designed to target businesses rather than individuals specifically, especially SQL Server databases. In one attack, in particular, the 'Okean-1955@india.com' Ransomware encrypted the data of more than ten thousand customers, affecting 15 branches of that business and three years worth of data. The 'Okean-1955@india.com' Ransomware also searches for backups and encrypts them as well. PC security analysts strongly advise computer users to avoid paying the 'Okean-1955@india.com' Ransomware's ransom and, instead, restore their files from a backup.

How the 'Okean-1955@india.com' Ransomware may Invade Your Computer

The 'Okean-1955@india.com' Ransomware uses a strong encryption method to encrypt the victims' data and then asks that the victims contact its india.com email address for instructions on how to pay. The 'Okean-1955@india.com' Ransomware delivers its ransom note in a text file named 'HOW TO DECRYPT FILES.txt.' In most cases, the 'Okean-1955@india.com' Ransomware is distributed using direct hacking and spam email attachments. The 'Okean-1955@india.com' Ransomware is using advanced obfuscation techniques to prevent interception and detection. The 'Okean-1955@india.com' Ransomware's payload will take the form of an EXE, DLL, TMP, VBS, BAT, or CMD file that is dropped into one of the following Windows directories:

%AppData%
%Roaming%
%Local%
%LocalRow%
%Windows%
%System%
%System32%
%Temp%

In most cases, the file will have a name that makes it appear as a legitimate Windows file, such as 'svchost.exe.' The 'Okean-1955@india.com' Ransomware is designed to encrypt the following file types:

PNG .PSD .PSPIMAGE .TGA .THM .TIF .TIFF .YUV .AI .EPS .PS .SVG .INDD .PCT .PDF .XLR .XLS .XLSX .ACCDB .DB .DBF .MDB .PDB .SQL .APK .APP .BAT .CGI .COM .EXE .GADGET .JAR .PIF .WSF .DEM .GAM .NES .ROM .SAV CAD Files .DWG .DXF GIS Files .GPX .KML .KMZ .ASP .ASPX .CER .CFM .CSR .CSS .HTM .HTML .JS .JSP .PHP .RSS .XHTML. DOC .DOCX .LOG .MSG .ODT .PAGES .RTF .TEX .TXT .WPD .WPS .CSV .DAT .GED .KEY .KEYCHAIN .PPS .PPT .PPTX ..INI .PRF Encoded Files .HQX .MIM .UUE .7Z .CBR .DEB .GZ .PKG .RAR .RPM .SITX .TAR.GZ .ZIP .ZIPX .BIN .CUE .DMG .ISO .MDF .TOAST .VCD SDF .TAR .TAX2014 .TAX2015 .VCF .XML Audio Files .AIF .IFF .M3U .M4A .MID .MP3 .MPA .WAV .WMA Video Files .3G2 .3GP .ASF .AVI .FLV .M4V .MOV .MP4 .MPG .RM .SRT .SWF .VOB .WMV 3D .3DM .3DS .MAX .OBJ R.BMP .DDS .GIF .JPG ..CRX .PLUGIN .FNT .FON .OTF .TTF .CAB .CPL .CUR .DESKTHEMEPACK .DLL .DMP .DRV .ICNS .ICO .LNK .SYS .CFG.

The ransom note displayed below has been associated with the 'Okean-1955@india.com' Ransomware:

'Все ваши файлы зашифрованы!!!!
для расшифровки обращаться на почту okean-1955@india.com
у вас есть 24 часа. после 24 часов расшифровку сделать сложнее.
All your files are encrypted!!!!
decryption handle mail okean-1955@india.com
you have 24 hours. after 24 hours to make decryption difficult.'

Dealing with the 'Okean-1955@india.com' Ransomware

Unfortunately, variants of the 'Okean-1955@india.com' Ransomware and other threats in this encryption Trojan family have been responsible for attacks against numerous organizations all around the world. Currently, some examples of high-profile attacks from the same family as the 'Okean-1955@india.com' Ransomware include Troldesh, Shade and Crysis, all well-known encryption ransomware threats. The best way to protect yourself and your business from the 'Okean-1955@india.com' Ransomware is to ensure that your backup methods are sound and that your computers are adequately protected with strong anti-malware software and passwords. It is possible that a decryption utility for the 'Okean-1955@india.com' Ransomware will be released in time. Avoid paying this threat's ransom, since it enables con artists to continue creating these threats and distributing them to inexperienced computer users. A well-managed backup method and strong security software are the best measures to preventing the 'Okean-1955@india.com' Ransomware attacks.

Trending

Most Viewed

Loading...