Threat Database Ransomware dzikusssT3AM Ransomware

dzikusssT3AM Ransomware

By GoldSparrow in Ransomware

The dzikusssT3AM Ransomware is an encryption ransomware Trojan. The dzikusssT3AM Ransomware is derived from Jigsaw, a well-known ransomware Trojan that has spawned numerous variants since it was first released. Threats like the dzikusssT3AM Ransomware can be delivered in several ways, but the most common is the use of corrupted email attachments. These email attachments often take the form of DOCX and PDF files that use embedded macro scripts to download the dzikusssT3AM Ransomware onto the victim's computer. Most of the dzikusssT3AM Ransomware attacks are targeting computer users located in Poland.

Symptoms of a dzikusssT3AM Ransomware Infection

The victims of the dzikusssT3AM Ransomware attack will first receive a spam email message that uses social engineering procedures to trick the victim into downloading and installing the dzikusssT3AM Ransomware. Once the dzikusssT3AM Ransomware has been installed, this threat will scan the victim's computer for the user-generated files and encrypt them using a strong encryption algorithm. The file extensions that may become targets of the attacks of the dzikusssT3AM Ransomware include:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp , .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif , .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The dzikusssT3AM Ransomware will rename the victim's files by adding the following string to the end of each affected file's name as a file extension:

.#__EnCrYpTED_BY_dzikusssT3AM_ransomware!__#

The dzikusssT3AM Ransomware delivers a ransom note and changes the infected PC desktop's wallpaper image into an image displaying the following message:

'ATTENTION ATTENTION!!!
Your personal files have been encrypted with the advanced AES-2048 algorithm,
After 72 hours, they will be removed permanently !!!
Your documents, music, movies, etc ...
As you already know, I've already encrypted your files, so you can not read them !!!
Every hour I choose one random file, and I permanently delete it !!!
I'm not able to recover such a file !!!
For the first 24 hours you will lose only a few files, the next day, several hundred, the third day, several thousand, etc. ...
Do not turn off the computer !!! If you restart your computer, I will restart and I will automatically delete 1000 files permanently !!!
If you want to recover ALL files, make a payment within one hour from the moment this window appears !!! Otherwise, you DO NOT RECOVER ALL FILES !!!
Remember that anti-virus can ONLY and exclusively remove malware, and not recover personal files that are important to you! It also involves losing files forever.
If you have any questions, please contact us by e-mail: pabluk700@protonmail.ch
WARNING!!! Time is running out, and the decision has to be taken. You have 2 options:
1. Pay the money and decode your files.
2. Don't pay and lose all your files.'

Dealing with the dzikusssT3AM Ransomware

The victims should make the payment of the ransom requested by the dzikusssT3AM Ransomware their last resource. They also should disregard all the instructions in the dzikusssT3AM Ransomware message and get rid of its infection immediately. The best protection against threats like the dzikusssT3AM Ransomware is to have file backups stored on places that the threats can't reach.

Trending

Most Viewed

Loading...