Gesd Ransomware

Gesd Ransomware Description

Ransomware threats have been among the most malware plaguing the Internet in 2019. The STOP family, in particular, is responsible for countless attacks since cyber crooks have managed to create and distribute over 200 copies of this file-locking Trojan. One of the newest variants of the STOP Ransomware that has been spotted by experts is called the Gesd Ransomware.

Propagation and Encryption

Ransomware threats are often propagated via mass spam email campaigns, torrent trackers, fake application downloads and updates, bogus pirated software and media, etc. However, in the case of the Gesd Ransomware, there are no particular infection vectors that have been confirmed yet. The attackers may be using one of the methods listed above or a combination of various techniques. The Gesd Ransomware will make sure to locate all the files of interest once it has managed to penetrate a system successfully. The Gesd Ransomware does not possess any new features compared to most variants of the STOP Ransomware. To lock the targeted data, the Gesd Ransomware will apply an encryption algorithm that will render the files unusable. Upon locking a file, the Gesd Ransomware will add a ‘.gesd’ extension at the file name. For example, a file that was initially named ‘NBG.mp3’ will be renamed to ‘NBG.mp3.gesd’ after it undergoes the encryption process of the Gesd Ransomware.

The Ransom Note

Following the example of most copies of the STOP Ransomware, the Gesd Ransomware will drop a ransom note named ‘_readme.txt’ on the desktop of the victim. In the note, the attackers outline several major points:

  • If the victim manages to contact the attackers within 72 hours of the attack, the ransom fee will be $490.
  • If the victim fails to meet the set deadline, the price will double, and they will have to pay $980 if they want to get their hands on the decryption key they need.
  • Two email addresses are provided as a means of communication with the attackers – ‘helprestore@firemail.cc’ and ‘datarestore@iran.ir.’

The attackers will attempt to convince you that the only way of recovering your data is if you pay them the sum demanded. However, authors of ransomware deliver on their promise rarely, and even users who pay up are often left disappointed when they never get the decryption key they were promised. This is why you should consider downloading and installing a legitimate anti-malware tool that will help you remove the Gesd Ransomware from your computer and keep your system safe in the future.

2 Comments

  • Akshay:

    Sir,My PC Is Affected By This Extension.
    All Files Are Encrypted By Online Key But To Do Decrypt It,I Need That Key Right.

    So,If I Am Having That Key,What I Have To Do To Decrypt My Files,As I Founded That Key In My Encrypted Files Only.
    Please REPLY Sir...

    • GoldSparrow:

      We highly recommend that you first remove the ransomware from your PC. After it's removed, you can then utilize any backup you may have to restore any files that it encrypted. It is not recommended that you not pay for the decryption key - it will only empower the hackers more.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.