Threat Database Ransomware Enjey Crypter Ransomware

Enjey Crypter Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 4
First Seen: March 8, 2017
Last Seen: June 5, 2018
OS(es) Affected: Windows

The Enjey Crypter Ransomware is a ransomware Trojan. The Enjey Crypter Ransomware carries out a typical ransomware attack, which involves encrypting the victims' files and then demanding the payment of a large ransom in exchange for the decryption key. These attacks have become quite common in the last few years because of their irreversible nature; once the victim's files have been infected, even if the Enjey Crypter Ransomware infection itself is removed, the files will remain compromised. The files encrypted during the Enjey Crypter Ransomware attack are simple to identify because the Enjey Crypter Ransomware will add the extension '.enjey' to the files' names.

The Infection Method Used by the Enjey Crypter Ransomware

There are numerous ways in which the Enjey Crypter Ransomware could spread. However, the most common is the use of corrupted email attachments contained in spam email messages. The Enjey Crypter Ransomware can be spread using social media websites or file sharing networks. It is important to treat all content downloaded from the Web with caution and be especially cautious when it comes to unsolicited email messages. A reliable security application that is fully up-to-date also can help computer users ensure that the Enjey Crypter Ransomware is not installed on a computer.

Once the Enjey Crypter Ransomware enters the victim's computer, it makes changes to the Windows Registry that allows it to maintain persistent, running automatically when Windows starts up. The Enjey Crypter Ransomware will then scan the victim's drives in search for files to encrypt in its attack. The Enjey Crypter Ransomware will use a strong encryption method to make the victim's files inaccessible completely. The Enjey Crypter Ransomware will then drop a ransom note in the form of a text note named 'README_DECRYPT.txt,' which includes the following text:

'//============================================= [ ENJEY CRYPTER ] =============================================\
Hello, your personal identity:
All of your documents, photos, databases and other important data has been encrypted.
To get a decoder, please contact me by e-mail: contact_here_me@india.com
In the message write the following: ‘ ‘ Hey, I need a decoder + your personal identifier ‘ ‘
You will receive Bitcoin wallet, which will need to pay.

If you have no Bitcoin wallet
– Create a Bitcoin wallet https://blockchain.info/wallet/#/signup~~dobj
– Buy cryptocurrency.
– Https://en.bitcoin.it/wiki/Help:FAQ (for beginners),
Attention!
– Do not try to do something on their own, you can lose all your data!
– Do not rename all files are encrypted!
\>//============================================= [ ENJEY CRYPTER ] =============================================//'

PC security researchers strongly advise computer users against paying the ransom amount or following the instructions contained in this ransom note. In its attack, the Enjey Crypter Ransomware will encrypt a wide variety of file types, including the following:

.7z, .bmp, .doc, .docm, .docx, .html, .jpeg, .jpg, .mp3, .mp4, .pdf, .php, .ppt, .pptx, .rar, .rtf, .sql, .tiff, .txt, .xls, .xlsx, .zip.

Dealing with the Enjey Crypter Ransomware Infection

Paying the ransom demanded by the people responsible for the Enjey Crypter Ransomware is not recommended because it allows these con artists to continue creating ransomware threats and affecting other computer users. Apart from this, there is no guarantee that these con artists will follow through and provide the decryption key after the ransom is paid. In many cases, the con artists will ignore the payment or ask for more money from the victim.

The Enjey Crypter Ransomware can be removed with the help of a reliable security program that is fully up-to-date easily. However, even if the Enjey Crypter Ransomware is removed, the victim's files will remain encrypted. Because of this, the best protection against ransomware threats like the Enjey Crypter Ransomware is to have backup copies of all files. System administrators, who may encounter these threats regularly, should have backup images of their files, as well as cloud storage. Computer users also should ensure that they have backup copies of their files on an external memory device or the cloud.

SpyHunter Detects & Remove Enjey Crypter Ransomware

File System Details

Enjey Crypter Ransomware may create the following file(s):
# File Name MD5 Detections
1. file.exe c92b209d85d866b40365ca5723e079ee 2

Trending

Most Viewed

Loading...