Threat Database Ransomware Frogo Ransomware

Frogo Ransomware

By GoldSparrow in Ransomware

The Frogo Ransomware is a new malware threat that, according to cybersecurity analysts, belongs to the Amnesia Ransomware family. Users affected by Frogo Ransomware will have their files encrypted and will be asked to pay a ransom with the Bitcoin currency in exchange for a decryption tool. Every affected file will have its name changed to a random string of letters and numbers, followed by the extension ".frogo." A ransom note will be dropped in a text file named "HOW TO RECOVER ENCRYPTED FILES.TXT."

To scare their victims into contacting them, the cyber crooks behind the Frogo Ransomware threaten that if 48 hours pass without any money being sent, they will start deleting between 2 and six of the encrypted files. If there is no payment within 90 hours of the ransomware infection, the files will be removed inadvertently. The email address provided for contact is

The full text of the ransom note is:



Your personal id

Your documents, photos, databases, save games and other important data were encrypted.
Data recovery requires a decryptor.

To receive the decryptor, you should send personal ID an email to the email address
In the letter, enter your personal ID (See at the beginning of this document).
If within 48 hours there will be no payment your files start to be deleted without a return of the not recovery !!
2-6 files will be deleted!!!
If within 90 hours there will be no payment all your data will be irretrievably removed !!
* With your e-mail
Personal id

If you do not have bitcoins
* Create a wallet Bitcoin: hxxps://
* Get Crypto Currency Bitcoin:
hxxps:// (Visa/MasterCard)
hxxps:// (What is bitcoin)

When the money transfer is confirmed, you will receive a file decryption for your computer.
After starting the decryption program all your files will be restored.

* Do not try to uninstall the program or run antivirus software
* Attempts to self-decrypt the files will lead to the loss of your data
* Decoders of other users are incompatible with your data, since each user
Unique encryption key.'


Most Viewed