Threat Database Ransomware Dulgtv Ransomware

Dulgtv Ransomware

The Dulgtv Ransomware is a threatening malware that has been classified as a variant belonging to the Xorist Ransomware family. Although the Dulgtv Ransomware doesn't display any major improvements over the typical Xorist Ransomware threat, it is still a powerful threat that can effectively lock users out of their own computers.

Upon infiltrating the targeted computer, the Dulgtv Ransomware will initiate its encryption process, which encompasses a wide range of file types such as MS Office files, PDFs, databases, audio and video files, photos, etc. Every encrypted file will have '.dulgtv' appended to its original filename as a new extension. The ransomware threat will then drop a set of instructions for its victims in the form of text files named 'HOW TO RESTORE YOUR FILES.TXT.' A copy of the ransom note-carrying file will be placed in every folder containing encrypted data.

The Dulgtv Ransomware's note doesn't mention any specific sum that victims must pay if they want to receive the decryption tool that the hackers possess. There is no mention of the money must be sent by using any of the popular cryptocurrencies. To receive more details, victims are supposed to initiate contact by sending a message to either 'cryptolifeguard@tutanota.com' or 'cryptolifeguard@cock.li.' They also can attach three files that are less than 1 MB in size to be decrypted for free. The only exception is that the files cannot be backups, Excel spreadsheets or databases.

The Dulgtv Ransomware note's full text is:

'Hello! All your files are encrypted and only I can decrypt them.

Contact me:

cryptolifeguard@tutanota.com or cryptolifeguard@cock.li

Write me if you want to return your files - I can do it very quickly!

The header of letter must contain extension of encrypted files.

I'm always reply within 24 hours. If not - check spam folder, resend your letter or try send letter from another email service (like tutanota.com).

Attention!

Do not rename or edit encrypted files: you may have permanent data loss.

To prove that I can recover your files, I am ready to decrypt any three files (less than 1Mb) for free (except databases, Excel and backups)

HURRY UP!'

Should Victims Pay the Ransom?

Security experts recommend you never contact the attackers or trust them with your money. There are numerous cases where victims send money to the attacker only for them to disappear. It is unlikely that you will get a decryption key at all, much less one that works. Paying the criminals also encourages them to attack other people and is discouraged for that reason. Instead, it would be best if you focused on recovering your files by yourself.

How to Recover Files

The good news is that it may be possible to recover your files without intervention. While there is no way to undo the encryption without outside help, you can still remove the virus and restore your files. Use a robust antimalware program to eliminate the virus from your machine. From there, use an external backup or an online cloud backup to restore your files. If you don’t have a data backup, you might still be able to use recovery software. The problem is that recovery tools use Shadow Volume Copies of data, which are often destroyed by ransomware. The creators want things to be as difficult as possible for you to coerce you into giving in and paying the ransom.

How Does Dulgtv Ransomware Infect Computers?

Like most ransomware, Dulgtv primarily spreads through spam email messages. Cybercriminals create spam emails with infected attachments or malicious links. Criminals write emails to appear legitimate and trick unsuspecting readers. Users with too much curiosity and too little experience open the attachments. The file downloads and activates the ransomware. One of the best ways to keep your computer safe from viruses is to avoid spam emails. Never open links or attachments unless you are sure of the sender. Check the message and recipient for minor mistakes that identify the message as coming from a fraudster.

Another standard malware proliferation method is illegal downloads. People turn to torrent sites to download games and software for free. Cybercriminals take advantage of this by uploading viruses under the names of popular downloads or by bundling their malware into illegal activation tools. Illegal downloads carry a lot more risks than most people realize.

Trending

Most Viewed

Loading...