Threat Database Ransomware Findnotefile Ransomware

Findnotefile Ransomware

The Findnotefile Ransomware is a new threat that has been detected by infosec researchers. The malware can disrupt any computer it manages to infect easily by initiating an encryption routine. The strong cryptographic algorithm ensures the victims will not be able to decrypt their files without the decryption key possessed by the hackers. Whenever the Findnotefile Ransomware locks a file, it will mark that file by appending a new extension to the original filename. In this case, the extension is '.findnotefile.' The ransom note of the threat will afterward be dropped on the breached computer in the form of text files named 'HOW_TO_RECOVER_MY_FILES.txt.'

The instructions left by the hackers clarify that apart from locking the user's files, the malware also collected data that is now stored on a remote server. Most current ransomware threats employ this tactic as extra leverage to get the victim to pay the demanded ransom. The Findnotefile Ransomware threatens that if the affected victims do not pay the asked amount within 12 days, their data will be leaked to the public. 

To receive further instructions, as well as the exact sum of the ransom, victims are expected to send a message to the two provided email addresses - 'emiliantor@mailfence.com' and 'emilianazizi@tutanota.com.' The hackers promise to decrypt a couple of small files for free as a demonstration of their ability to restore the locked data. 

The entire ransom note delivered by Findnotefile Ransomware is:

'All data in your machine turned to useless binary code.
Your databases and importanant files have been downloaded and will be published after 12 days if not paid.
To return files and prevent publishing email us at: emiliantor@mailfence.com, emilianazizi@tutanota.com (send copy to both).

Tips:

*No one else can help you , don't waste your business time.
*You ask for proff that we have your data , and you can see our old targer that their data have been published.
*If not paid after 12 days Google your company name and you will see your private and custorres data in there, happy will legal and bussiness challenges of data leak after.
*For decryption anyone/any company offerin help will get extra fee(some times even more than ours!)added to ours or simplly will scam you (dont pay us after getting test file, lie and scam you)
so if you wan a intermediary chose a trusted one to avoid scams , and get your data.
*For decryption you send a few sample files for test before any payment.

We won't be available for long.
Dont play with encrypted files that will corrupt them and make unrecoverable.

Use google translate (if you don't know english)
Key ID:
'

Trending

Most Viewed

Loading...