Threat Database Ransomware CryptoPokemon Ransomware

CryptoPokemon Ransomware

By GoldSparrow in Ransomware

Pokemon was used once again to name a ransomware, the CRYPTOPOKEMON Ransomware, after being very popular among children. The CRYPTOPOKEMON Ransomware is spread through the Internet by an effective campaign that uses corrupted websites and emails messages that looks like legitimate messages from trusted sources. The CRYPTOPOKEMON Ransomware attacks consist of the threat loading various built-in modules that may be launched all together or separately, depending on the will of its controller. The CRYPTOPOKEMON Ransomware will delete the Windows Restore Points, the Shadow Volume Copies and any backup, letting the victims without a recovery chance, unless they have a backup of their files stored externally. Then the CRYPTOPOKEMON Ransomware will scan the infected computer looking for any security application that can prevent its actions. If it finds it, the tool can be paralyzed or erased. Then the CRYPTOPOKEMON Ransomware will start doing what it was created for: lock the victims' screen to its ransom note, encrypt the victims' files and demand the payment of a ransom. Below, you will find the CRYPTOPOKEMON Ransomware's ransom note:

'Do not try to decrypt the files yourself, this will only contribute to the loss of all your data on the computer.
All files on your computer are encrypted. Files have the extension CRYPTOPOKEMON.
To decrypt files, please transfer 0.0200000 BTC to 1Lx46kNYSXTRwMWBxhxxdW3nisJ61yfVoW
After you transfer money, write to email qaq94t64c45d3scd@openmailbox.org , saying this word “12356749412506806744”.
For advanced users:
After transferring money, go to http://cryptopokemon.top/ , and follow the instructions.
Your computer ID: 12356749412506806744
To enter the site, use the browser.
COPYRIGHT (c)2019 PokemonGO CRYPTOLOCKER pokemongo.icu'

Infected computer users should remove the CRYPTOPOKEMON Ransomware from their machines as the first step to deal with its infection. Then they should make use of their backups and if they don't have it, look for alternative removal techniques.

Trending

Most Viewed

Loading...