Threat Database Ransomware Acessd Ransomware

Acessd Ransomware

The Acessd Ransomware program is a threatening malware tool that is capable of locking victims out of their own data and files. Upon being successfully executed, the threat begins encrypting files and modifying their names by adding a '.acessd' extension to the original filenames. For example, a file named '1.doc' would afterward appear as '1.doc.acessd,' and so on. Additionally, the ransomware generated a ransom note entitled 'How_to_back_files.html.' Cybersecurity researchers have confirmed that the Acessd Ransomware is not a unique malware strain. Instead, it is a variant belonging to the MedusaLocker Ransomware family.

Attacks by the Acessd Ransomware could Have Devastating Consequences

The Acessd Ransomware is a type of malware that targets companies, rather than individual users. When the ransomware infects a system, it encrypts the victims' files using RSA and AES cryptographic algorithms, rendering them inaccessible to the owner. The ransomware also exfiltrates sensitive information, putting victims' data at risk.

Acessd displays a ransom note informing the victims that their company has been compromised and that their files are encrypted. The note warns against renaming or modifying the encrypted files, or using third-party decryption tools, as doing so will render the data undecryptable. To recover their data, victims are required to pay a ransom of unspecified size. The ransom note also includes a warning that the ransom amount will increase if the attackers are not contacted within 72 hours.

The ransom note states that if victims refuse to pay, the attackers will either leak or sell the stolen data. Victims are also offered the option to test decryption, within certain specifications, free of charge, before making any payments.

Important Measures that can Mitigate the Damage Caused by Ransomware Threats

Ransomware threats can be devastating for individuals and organizations alike, and taking steps to mitigate the damage caused by these threats is essential. The following are some general guidelines that users can follow to reduce the impact of ransomware attacks:

  1. Prevention: One of the most important steps to take is to prevent ransomware attacks from occurring in the first place. This can be done by being vigilant while browsing the web, avoiding clicking on suspicious links or downloading unverified software, and keeping all software and operating systems up-to-date with the latest security patches.
  1. Regular Backups: Creating regular backups of all important files and data is another essential step in mitigating the damage caused by ransomware. These backups should be kept offline or in secure locations, so that they cannot be compromised by ransomware.
  1. Early Detection: Early detection of ransomware is crucial in mitigating the damage caused by these threats. Users should regularly scan their systems for any signs of infection, such as unusual file extensions or changes in file names.
  1. Isolation of Infected Devices: If a system is found to be infected with ransomware, it is essential to isolate the device from the network immediately. This can help prevent the spread of ransomware to other devices and systems.

By taking these steps, users can mitigate the damage caused by ransomware attacks and minimize their impact on their personal and professional lives.

The ransom note dropped by the Acessd Ransomware is:

'YOUR PERSONAL ID:

/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\
All your important files have been encrypted!

Your files are safe! Only modified. (RSA+AES)

ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE
WILL PERMANENTLY CORRUPT IT.
DO NOT MODIFY ENCRYPTED FILES.
DO NOT RENAME ENCRYPTED FILES.

No software available on internet can help you. We are the only ones able to
solve your problem.

We gathered highly confidential/personal data. These data are currently stored on
a private server. This server will be immediately destroyed after your payment.
If you decide to not pay, we will release your data to public or re-seller.
So you can expect your data to be publicly available in the near future..

We only seek money and our goal is not to damage your reputation or prevent
your business from running.

You will can send us 2-3 non-important files and we will decrypt it for free
to prove we are able to give your files back.

Contact us for price and get decryption software.

If you can not use the above link, use the email:
support1@dustintune.com
support2@mrcpinks.com

To contact us, create a new free email account on the site: protonmail.com
IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.'

Trending

Most Viewed

Loading...