Threat Database Ransomware 'admin@dontfuckme.top' Ransomware

'admin@dontfuckme.top' Ransomware

By GoldSparrow in Ransomware

The 'admin@dontfuckme.top' Ransomware Trojan is an encryption ransomware Trojan designed to take the victims' files hostage. The 'admin@dontfuckme.top' Ransomware first appeared in the beginning week of February 2019, and it is unknown whether the 'admin@dontfuckme.top' Ransomware's attack can be reversed currently. The 'admin@dontfuckme.top' Ransomware, like most encryption ransomware Trojans, is designed to take the victims' files hostage, encrypting them with a strong encryption algorithm and then demanding a ransom payment to be provided with the decryption key needed to restore the affected data. It is crucial that the computer users take precautions against this threat, such as having backup copies of their files or using a security application to protect their PCs.

How the 'admin@dontfuckme.top' Ransomware Attack Works

The 'admin@dontfuckme.top' Ransomware uses a strong encryption algorithm to make the files inaccessible. The 'admin@dontfuckme.top' Ransomware targets the user-generated files, which may include a wide variety of document types, media files, databases, configuration files, and numerous other, similar documents. The 'admin@dontfuckme.top' Ransomware attack will mark the files targeted by its attack with an extension made up of six random alphabetical characters. The files that threats like 'admin@dontfuckme.top' Ransomware target in these attacks include:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

Once the 'admin@dontfuckme.top' Ransomware has encrypted the victim's files, the 'admin@dontfuckme.top' Ransomware demands a ransom payment. To do this, the 'admin@dontfuckme.top' Ransomware delivers a text file named ‘HOW_TO_DECRYPT_MY_FILES.txt,' which is dropped on the infected computer's desktop. The 'admin@dontfuckme.top' Ransomware demands a ransom of 200 USD to be paid using Bitcoin. Computer users should not pay the 'admin@dontfuckme.top' Ransomware ransom or contact the criminals responsible for the 'admin@dontfuckme.top' Ransomware attack. It is highly unexpected that the criminals responsible for 'admin@dontfuckme.top' Ransomware will help the victims of the 'admin@dontfuckme.top' Ransomware attack, and they are just as likely to demand additional payments or target the victim with additional tactics or attacks.

Recovering from an 'admin@dontfuckme.top' Ransomware Attack

Unfortunately, once the 'admin@dontfuckme.top' Ransomware attack has taken place, the compromised files will no longer be accessible without the decryption key required to decrypt them. Because of this, the best protection against threats like 'admin@dontfuckme.top' Ransomware is to have backup copies of all files and have these backups kept safe. Apart from file backups, computer users should protect their computers with a security program that is capable of intercepting and removing threats like 'admin@dontfuckme.top' Ransomware before they manage to carry out their attacks and compromise the victim's files completely. Since 'admin@dontfuckme.top' Ransomware is typically delivered using spam email attachments, learning to handle this content safely is also essential in preventing 'admin@dontfuckme.top' Ransomware attacks.

Trending

Most Viewed

Loading...