Threat Database Ransomware Euclid Ransomware

Euclid Ransomware

By GoldSparrow in Ransomware

The Euclid Ransomware is a recently uncovered data-encrypting Trojan. When malware experts dissected this threat, they found out that the Euclid Ransomware is not a member of the families of popular Ransomware threats.

Cybersecurity researchers are not yet able to confirm what the infection vector employed by the authors of the Euclid Ransomware is. It is being speculated that the attackers may be using bogus software updates, as well as infected pirated data and spam email campaigns. When the Euclid Ransomware gains access to a system, it will begin a scan immediately. When the scan is through, the Euclid Ransomware would have located all the files, which it will target. Then, the Euclid Ransomware begins encrypting the targeted data. When a file is encrypted by this threat, you will notice that its name will be altered. The Euclid Ransomware adds an '.euclid' extension to the locked files' names. For example, a file originally named 'hand-cream.jpeg' will be called 'hand-cream.jpeg.euclid' when the encryption process is over. The next step of the attack is to drop the ransom note.

The Euclid Ransomware's ransom note is named 'how to recovery.txt.' This threat's ransom message is very thorough. In the note, the attackers explain what has happened to the victim's files and go on to say that all the data can be recovered. Then, the authors of the Euclid Ransomware instruct the victim on how to contact them. Unlike most ransomware authors, who usually provide the victim with an email address, the creators of the Euclid Ransomware use the Telegram messenger for communication with the victims. They give out their Telegram ID - @SalsaRecovery. The crooks also offer to decrypt one file, no matter the size, for free, so that the victim would see that the files can be decrypted. The Euclid Ransomware creates a file that is needed to complete the decryption process - 'decryption_keys.euclidkeys.' The attackers state that any user who wants to have their data recovered will need to pay a ransom fee and submit the file in word to the Telegram address seen in the ransom note.

Do not get tricked into paying cybercriminals. They are not trustworthy individuals. A safer approach would be to download and install a reputable anti-spyware tool and clear your PC.

Trending

Most Viewed

Loading...