KUZA Ransomware
KUZA Ransomware er en truende trussel. KUZA Ransomware krypterer offerfiler og tilføjer '.Ripa'-udvidelsen til dem, nogle gange også tilføjer cyberkriminelles e-mailadresser. Ved infektion leverer KUZA Ransomware en løsesum-seddel med navnet '#Read-for-recovery.txt' til ofrene og kræver betaling for dekryptering. KUZA Ransomware tilhører den berygtede Proton Ransomware- familie.
Nøglekarakteristika ved KUZA Ransomware:
- Filkryptering: KUZA krypterer filer og tilføjer udvidelsen '.Ripa' til dem sammen med cyberkriminelles e-mailadresse til kontakt.
- Løsebeløbsbesked: Ofre modtager en løsesum-besked kaldet '#Read-for-recovery.txt' for at indlede kontakt til betaling og dekryptering.
- Kontaktoplysninger: Cyberkriminelle angiver to e-mailadresser til kommunikation: amir206amiri2065sa@gmail.com og amir206amiri2065sa@tutamail.com.
- Infektionsvektorer: KUZA Ransomware kan infiltrere computere via svigagtige reklamer, torrent-websteder eller inficerede e-mail-vedhæftede filer, der indeholder makroer.
Beskyttelse mod KUZA Ransomware:
For at beskytte mod KUZA og lignende ransomware-trusler:
- Vær forsigtig med e-mailvedhæftede filer: Undgå at åbne mistænkelige vedhæftede filer, især fra ukendte afsendere.
- Vær på vagt over for torrents og annoncer: Afstå fra at downloade software eller klikke på annoncer fra utroværdige kilder.
- Implementer sikkerhedssoftware: Installer velrenommeret anti-malware-software og opdater det for at opdage og forhindre ransomware-angreb.
KUZA Ransomware understreger det kritiske behov for effektive cybersikkerhedsforanstaltninger for at mindske risikoen for tab af data og økonomisk skade.
Beskeden om løsesum, som ofre for KUZA Ransomware vil modtage, lyder:
'~~~ KUZA ~~~
>>> What happened?
We encrypted and stolen all of your files.
We use AES and ECC algorithms.
Nobody can recover your files without our decryption service.
>>> How to recover?
We are not a politically motivated group and we want nothing more than money.
If you pay, we will provide you with decryption software and destroy the stolen data.
>>> What guarantees?
You can send us an unimportant file less than 1 MG, We decrypt it as guarantee.
If we do not send you the decryption software or delete stolen data, no one will pay us in future so we will keep our promise.
>>> How to contact us?
Our email address: amir206amiri2065sa@gmail.com
In case of no answer within 24 hours, contact to this email: amir206amiri2065sa@tutamail.com
Write your personal ID in the subject of the email.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>> Your personal ID: - <<<<<
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>> Warnings!
- Do not go to recovery companies, they are just middlemen who will make money off you and cheat you.
They secretly negotiate with us, buy decryption software and will sell it to you many times more expensive or they will simply scam you.
- Do not hesitate for a long time. The faster you pay, the lower the price.
- Do not delete or modify encrypted files, it will lead to problems with decryption of files.'