Threat Database Ransomware Eqew Ransomware

Eqew Ransomware

After conducting a comprehensive analysis, cybersecurity experts have identified a new variant of ransomware known as Eqew. Eqew is categorized as a highly damaging threat that aims to compromise a user's system by encrypting the files, making them inaccessible.

The Eqew Ransomware functions by altering the original file names during the encryption process, adding the extension ".eqew" to them. For instance, if a file is named '1.jpg,' Eqew will rename it to '1.png.eqew.' Similarly, a file named '2.png' will be changed to '2.png.eqew,' and so on. Additionally, Eqew generates a ransom note in the form of a '_readme.txt' file, offering payment instructions to obtain the decryption key required for unlocking the encrypted files.

It's important to highlight that Eqew belongs to the STOP/Djvu Ransomware family and may be distributed alongside other malware like VidarRedLine or other information stealers. Consequently, users should exercise caution and implement appropriate security measures to prevent falling victim to additional security or privacy threats.

The Eqew Ransomware Can Lock a Wide Range of Different Files

The ransom note declares that files, including images, databases, and essential documents, have undergone encryption. To regain entry to these files, victims are directed to obtain a decryption tool and a unique key. The note incorporates a provision for assurance, permitting victims to submit one encrypted file for complimentary decryption on the condition that the file does not contain valuable information.

The cost associated with obtaining the private key and decryption software is $980. However, there is an opportunity for a 50% discount if victims initiate contact with the attackers within the initial 72 hours, thereby reducing the price to $490. Victims can establish communication with the cybercriminals through the provided email addresses, specifically and

Attempting to decrypt files independently poses a significant challenge as the attackers maintain control over the necessary decryption tools. This leaves victims with limited options for restoring file accessibility. However, paying a ransom is strongly advised against due to the absence of any assurance that the attackers will fulfill their promises by providing the pledged decryption tools. Furthermore, complying with their demands inadvertently supports their illicit activities, potentially empowering them to carry out more attacks.

Take Immediate Action to Protect Your Data and Devices

To enhance the protection of your devices and data against ransomware threats, it is essential to adopt a comprehensive set of security practices. Here are some recommended measures:

  • Keep Software Updated: Update your applications, operating system and security software regularly to ensure that you have the latest security patches. These updates often include bug fixes and enhancements that fortify your defenses against known vulnerabilities exploited by ransomware.
  •  Install Reputable Anti-Malware Software: Utilize robust security software that provides real-time protection against malware, including ransomware. Keep the anti-malware software up to date and perform scheduled scans to identify and remove any threatening programs.
  •  Enable Automatic Backups: Routinely back up crucial data to an independent hard drive, Network-Attached Storage (NAS), or a cloud-based backup service. Automated backups are crucial to safeguard your files in the event of a ransomware attack. Ensure that the backup device or service is not continuously connected to your computer or network, as ransomware can also encrypt connected backup files.
  •  Exercise Caution with Email Attachments and Downloads: Be vigilant when opening email attachments or downloading files from unknown or suspicious sources. Avoid interacting with links or downloading attachments in unsolicited emails, as they may contain ransomware or other malware. Employ a reliable spam filter to identify and block fraudulent emails.
  •  Be Cautious of Social Engineering Tactics: Exercise caution regarding unsolicited phone calls, messages, or pop-ups requesting personal information or credentials. Ransomware attackers often employ social engineering techniques to deceive users into opening malicious links or divulging sensitive information.
  •  Educate and Train Employees: Conduct regular cybersecurity awareness instruction to educate employees about the risks of a ransomware infection and how to identify and respond to potential threats. Training should encompass best practices for email security, safe browsing habits, and recognizing social engineering attempts.

By implementing these security measures and remaining vigilant, you can significantly mitigate the risk of falling victim to ransomware attacks, thereby safeguarding your devices and valuable data.

Victims of the Eqew Ransomwarwill receive the following ransom note:


Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:

Reserve e-mail address to contact us:

Your personal ID:'


Most Viewed