Threat Database Ransomware '.cekisan File Extension' Ransomware

'.cekisan File Extension' Ransomware

By GoldSparrow in Ransomware

The '.cekisan File Extension' Ransomware is an encryption ransomware Trojan. The '.cekisan File Extension' Ransomware attacks were first reported on February 20, 2019. The '.cekisan File Extension' Ransomware seems to be a variant of already existing malware threats and may belong to the Everbe 2.0 Ransomware family, a group of ransomware Trojans created using a Ransomware Builder Kit that allows the criminals to create custom versions of these threats. The '.cekisan File Extension' Ransomware carries out a typical encryption ransomware attack, taking the victims' files hostage, which will justify the demand of a ransom in exchange for restoring access to the affected data.

Symptoms of a '.cekisan File Extension' Ransomware Attack

The '.cekisan File Extension' Ransomware is designed to make the victim's files inaccessible. To do this, the '.cekisan File Extension' Ransomware targets the user-generated files with an encryption algorithm, encrypting their contents so that they will be inaccessible. Threats like the '.cekisan File Extension' Ransomware usually target the same file types in their attacks, which include:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The '.cekisan File Extension' Ransomware attack renames the encrypted files with the file extension '.cekisan' added to each file's name. The '.cekisan File Extension' Ransomware displays a ransom note, which demands that the victims pay a ransom as a condition to receive the decryption key that should be used to restore the compromised content after their files become inaccessible. The '.cekisan File Extension' Ransomware ransom note is contained in a text file named 'Readme_Restore_Files.txt,' which it will drop on the infected computer's desktop. The full text of the '.cekisan File Extension' Ransomware ransom note reads:

Do not rename the ciphered files.
Do not try to decrypt your data with the help of the third-party software, it can cause constant data loss.
If you, your programmers or your friends help you to decrypt your files - it can lead to data loss.
You do not joke with files.
My email'

Computer users are counseled to refrain from contacting the criminals responsible for the '.cekisan File Extension' Ransomware Trojan or following the instructions contained in the '.cekisan File Extension' Ransomware's ransom note.

Dealing with the '.cekisan File Extension' Ransomware Infection

If your files have become compromised by the '.cekisan File Extension' Ransomware, the best solution is to take steps to restore the compromised files from a backup copy. This is why having file backups and storing these on external devices is the best protection against threats like the '.cekisan File Extension' Ransomware. A malware removal application also should be used to protect your PC from these attacks.


Most Viewed