Threat Database Ransomware DESYNC Ransomware

DESYNC Ransomware

By GoldSparrow in Ransomware

The DESYNC Ransomware is an encryption ransomware Trojan that was first observed on January 29, 2019. The DESYNC Ransomware attacks first targeted small business networks and servers. The DESYNC Ransomware is typically delivered by taking advantage of poor security settings on remote desktop applications. The DESYNC Ransomware, like most encryption ransomware Trojans, is designed to take the victims' files hostage to demand a ransom payment.

How the DESYNC Ransomware Trojan Affects Your Files

The DESYNC Ransomware targets the user-generated files, such as various document types, media files and databases. The following are examples of the files that threats like the DESYNC Ransomware target in these attacks:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The DESYNC Ransomware attack makes the affected files easy to identify by changing them with the file extension '.DESYNC,' added to the end the file's name. The DESYNC Ransomware delivers a ransom message in a text file named '#HOW TO DECRYPT YOUR FILES #.tx,' which contains the following message for the victim:

'PLEASE READ THIS FILE IF YOU WANT TO GET BACK YOUR FILES

All your files are encrypted on your network using a powerful and highly sophisticated encryption algorithm.
No way to recover your files without buy special decryption service that we have made for you!
If you are looking for internet. You will see nothing except scam websites want you to install their software and waste your money for them.
Any change in encrypted files completely breaks your file for every.
Will free guarantee our decryption service, we have to offer you 'ONE FREE FILE DECRYPTION'
You can send us one of any of your encrypted files in the first contact with us.
But, if you want to recover all your files need to make payment.
Now go to your email and send your 'PERSONAL IDENTIFIER' to following e-mail address:
desync@airmail.cc

Don't forget to send e-mail us only with your work e-mail address, else we never reply you.

-----BEGIN PERSONAL IDENTIFIER-----
[random characters]
-----END PERSONAL IDENTIFIER-----'

Protecting Your Data from Threats Like the DESYNC Ransomware

Computer users are instructed by the experts not to pay the DESYNC Ransomware ransom or contact the criminals responsible for the attack. Since the DESYNC Ransomware encryption makes the files unrecoverable without the decryption key, the best protection against threats like the DESYNC Ransomware is to have backups of your files stored on protected locations such as the cloud or an external memory device. Apart from file backups, computer users also should use a security program to prevent threats like the DESYNC Ransomware from being installed in the first place.

Trending

Most Viewed

Loading...