Threat Database Ransomware Globe Ransomware

Globe Ransomware

By GoldSparrow in Ransomware
Translate To:

Threat Scorecard

Popularity Rank: 17,204
Threat Level: 100 % (High)
Infected Computers: 49,628
First Seen: August 24, 2016
Last Seen: October 24, 2025
OS(es) Affected: Windows

The Globe Ransomware has the potential to inflict quite a lot of damage. The Globe Ransomware is a typical ransomware Trojan, designed to encrypt the victim's files, taking them hostage essentially. The Globe Ransomware then demands the payment of a ransom in exchange for the key needed to decrypt the affected files. Ransomware Trojans like the Globe Ransomware have become quite popular in recent times, making it necessary for computer users to learn how to protect themselves and their files from infections like the Globe Ransomware. Unfortunately, it may be nearly impossible to decrypt the files that have been encrypted by the Globe Ransomware or other ransomware Trojans that use advanced encryption algorithms and an encryption method that makes it impossible to extract a decryption key from the affected computer. The best protection against threats like the Globe Ransomware is to have appropriate backups for all files on a computer.

The Main Targets of the Globe Ransomware are Small Business

Currently, the Globe Ransomware is not very widespread. The main targets of the Globe Ransomware are located in Central Asia. The amount demanded by the Globe Ransomware changes, and is somewhere between 1 and 3 BitCoins (which is currently between $600 and $1800 USD at the current exchange rates). One particularly worrying aspect of the Globe Ransomware is that it seems to target small businesses mainly, making the potential for damage from the Globe Ransomware larger than with other ransomware threats.

After encrypting a victim's files, the Globe Ransomware drops a ransom note contained in a file named 'How to restore your files.hta,' which contains instructions on how to pay the Globe Ransomware ransom and recover the encrypted files. The victims are instructed to contact the con artists at an email address on the domain @tutanota.com. The Globe Ransomware attack is fairly straightforward. The Globe Ransomware may be delivered through a corrupted email attachment. This email attachment drops an executable file on the victim's computer, which carries out the encryption. In most cases, the Globe Ransomware will avoid files that are essential for Windows to function, instead targeting documents and media files that the computer users would have a hard time recovering without a backup. The Globe Ransomware is designed to run automatically whenever Windows starts up, and recovery from this threat will require the use of an updated and resourceful anti-malware program to ensure that the Globe Ransomware infection is completely removed.

How Threats Like the Globe Ransomware may be Delivered

The most common delivery method for threats like the Globe Ransomware is the use of corrupted email attachments that may use social engineering techniques like fake tax returns or receipts to convince computer users to open corrupted email attachments. Because of this, educating computer users on handling email and using reliable anti-spam filters properly are among the best measures that can be taken to prevent the Globe Ransomware attacks and infections with similar threats. There are other ways in which the Globe Ransomware can be delivered, including corrupted online advertisements, exploit kits, and the direct hacking of the victim's computer. General online security measures, strong anti-malware software, and keeping all programs fully up-to-date will help computer users to avoid Globe Ransomware infections, as well as problems with other threats.

Dealing with a Globe Ransomware Infection

Unfortunately, removing the Globe Ransomware infection will not decrypt the victim's files. Because of this, it will be necessary to not only remove the Globe Ransomware itself but also restore the affected files from a backup location. Malware analysts strongly advise against paying the Globe Ransomware's ransom. Paying these enormous amounts to recover files only allows con artists to continue creating threats. Remember that, when dealing with con artists such as these, there is no guarantee that they will keep their word and restore the affected files after the computer user pays the Globe Ransomware ransom.

SpyHunter Detects & Remove Globe Ransomware

File System Details

Globe Ransomware may create the following file(s):
# File Name MD5 Detections
1. !!! READ THIS - IMPORTANT !!!.hta 2b7bd31fd3447cd1b0e0bdfd690b0740 442
2. HOW_OPEN_FILES.hta e3b9bb7ca0576dfe90e94aac1d333630 75
3. Read Me Please.hta 58f8086cdb674cc03cced8e65d495c44 25
4. trust.exe 668c83c1f7f13259ab5d1699ea24d17f 2
5. How to restore files.hta 503478dce7398eac1ce8cc7db0fea7b9 1
6. file.exe a464f7bc0431292d74ad66403efbf691 0
More files

Registry Details

Globe Ransomware may create the following registry entry or registry entries:
File name without path
How To Recover Encrypted Files.hta
How To Recover Encrypted Files.html
How to restore files.hta
HOW_OPEN_FILES.hta
Read Me Please.hta
Software\Microsoft\Windows\CurrentVersion\Run\How To Recover Encrypted Files

Related Posts

Trending

Most Viewed

Loading...