'.777 File Extension' Ransomware
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 100 % (High) |
Infected Computers: | 22 |
First Seen: | May 18, 2016 |
Last Seen: | December 20, 2022 |
OS(es) Affected: | Windows |
The '.777 File Extension' Ransomware encrypts its victims' files and replaces their extension with the extension '.777' after encrypting them using an advanced encryption algorithm. Currently, reports involving the '.777 File Extension' Ransomware point to attacks on servers and enterprise targets, with demands for ransom payments averaging $1500 USD. It is nearly impossible to recover from a '.777 File Extension' Ransomware infection, and it may be necessary to wipe the affected hard drive clean and restore the files from a backup. If the '.777 File Extension' Ransomware attack is interrupted while it is in the process of encrypting files, it is still possible to recover from Shadow Volume Copies, and it will not deliver a ransom note until after the entire victim's hard drive has been encrypted.
How the '.777 File Extension' Ransomware may be Delivered
There are numerous ways in which the '.777 File Extension' Ransomware can be delivered. In cases where servers have been affected, it may be the result of a direct hack from the con artists responsible for the attack. However, like most ransomware Trojans, the '.777 File Extension' Ransomware is also delivered by using threatening email attachments. Computer users will receive corrupted spam messages that may pretend to be official notifications from shipping companies or other legitimate organization. When computer users open the corrupted attachment or click on an embedded link, the '.777 File Extension' Ransomware is installed on the affected computer.
The '.777 File Extension' Ransomware can Encrypt Hundreds of Files
After the '.777 File Extension' Ransomware has entered a computer, it encrypts the victim's files with an advanced encryption algorithm. The '.777 File Extension' Ransomware and its variants can target hundreds of different file types, encrypting them and changing their extension to '.777;' Some examples of common file types targeted by the '.777 File Extension' Ransomware and similar ransomware threats include:
.sql, .mp4, .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps, .docm, .docx, .doc, .odb, .odc, .odm, .odp, .ods, .odt.
After encrypting the victim's files, the '.777 File Extension' Ransomware delivers a ransom note with instructions on how to pay it. The '.777 File Extension' Ransomware also may deliver its ransom note via email, particularly in cases where the infection targeted a server or enterprise.
Prevention is the Best Way of Dealing with the '.777 File Extension' Ransomware
Most ransomware threats, including the '.777 File Extension' Ransomware, can best be fought through preventive practices. Computer users should avoid paying the '.777 File Extension' Ransomware ransom, since there is no guarantee that the con artists will honor their promise and deliver the decryption key. Paying the '.777 File Extension' Ransomware ransom also enables the people responsible for the '.777 File Extension' Ransomware to continue developing these threats. Backup all files on an external drive or the cloud and limit exposure from one drive to the other to avoid the '.777 File Extension' Ransomware from spreading to the backup as well.
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.