Threat Database Ransomware '.FuckedByGhost File Extension' Ransomware

'.FuckedByGhost File Extension' Ransomware

By GoldSparrow in Ransomware

The '.FuckedByGhost File Extension' Ransomware is an encryption ransomware Trojan. The first reports of the '.FuckedByGhost File Extension' Ransomware attacks appeared on August 24, 2018. The '.FuckedByGhost File Extension' Ransomware carries out a typical variant of these attacks, taking the victim's files hostage and then demanding a ransom payment.

How the '.FuckedByGhost File Extension' Ransomware Enters a Computer

The '.FuckedByGhost File Extension' Ransomware uses the AES 256 encryption to make the victim's files completely inaccessible. The '.FuckedByGhost File Extension' Ransomware, once the files have been compromised, will demand that the victim pay a ransom using Bitcoin. The '.FuckedByGhost File Extension' Ransomware is one of the many variants that exist of the Jigsaw Ransomware, a well-known ransomware threat. The '.FuckedByGhost File Extension' Ransomware reaches its victims through the use of corrupted PDF or DOCX files that have embedded macro scripts to download and install the '.FuckedByGhost File Extension' Ransomware. Once installed, the '.FuckedByGhost File Extension' Ransomware will search the victim's computer for the user-generated files with the following file extensions:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The '.FuckedByGhost File Extension' Ransomware will damage the files and makes them inaccessible and easy to recognize since the '.FuckedByGhost File Extension' Ransomware adds the file extension '.FuckedByGhost' to the end of the file's name.

Dealing with the '.FuckedByGhost File Extension' Ransomware

The '.FuckedByGhost File Extension' Ransomware will deliver a ransom note after the victim's files have been encrypted. The most common way in which ransom notes like these are delivered is through text files dropped on the infected computer, generally found on the victim's desktop. These ransom note files are typically named 'HOW TO DECRYPT FILES.TXT' or 'READ_ME.TXT' and may be located on several places on the victim's computer. Computer users are counseled to ignore all of the '.FuckedByGhost File Extension' Ransomware demands. Since the '.FuckedByGhost File Extension' Ransomware's encryption is unbreakable currently, computer users should use an updated security suite to prevent the '.FuckedByGhost File Extension' Ransomware from being installed in the first place. The '.FuckedByGhost File Extension' Ransomware's damage, as with most encryption ransomware Trojans, can be undone if the victims have backup copies of their files stored in a location that is out of reach from the threat. Examples of safe backup options include an external memory device that is not connected to the main PC or having backup copies of any sensitive data stored on the cloud, in a location that is not synchronized to prevent the backups themselves from becoming corrupted.

Trending

Most Viewed

Loading...