Godra Ransomware Description
The Godra Ransomware is an encryption ransomware Trojan that was first observed by PC security researchers on December 15, 2017. The Godra Ransomware is used to make the victims' files inaccessible, essentially taking them hostage. The people responsible for the Godra Ransomware demand a ransom payment from the victim once the victim's files have been compromised. The most common way of delivering the Godra Ransomware to the victims is by attaching it to spam email messages, in the form of a Microsoft Word file with bad embedded scripts that download and install the Godra Ransomware onto the victim's computer. To prevent the Godra Ransomware attacks, PC users must take steps to avoid spam email attachments, as well as use a fully up-to-date security program to intercept these threats and other malware.
A Weird Name for a Harmful Threat
The Godra Ransomware variant observed by PC security researchers seems to target computer users located in Croatia, which is supported by this ransomware Trojan's ransom message and the location of many of the Godra Ransomware attacks. However, there is nothing preventing the Godra Ransomware from spreading to other geographical locations. The Godra Ransomware will use a strong encryption algorithm to make the victim's files inaccessible. The Godra Ransomware marks the files encrypted by its attack with the file extension '.godra,' which will be added to the end of each file's name. Once the Godra Ransomware finishes encrypting the files, they become inaccessible without the decryption key, which the cybercrook hold in their possession. The Godra Ransomware targets the user-generated files while avoiding the Windows system files. The file types that may be targeted by ransomware Trojans like the Godra Ransomware include:
.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip.
How the Godra Ransomware Carries out Its Attack
The Godra Ransomware uses a strong encryption algorithm to compromise the victims' files and then, the Godra Ransomware demands a ransom payment from the victim. The Godra Ransomware's ransom consists of approximately €2,000, to be paid using Bitcoin. However, paying the Godra Ransomware ransom shouldn't be considered. The Godra Ransomware will drop two files on the victim's computer. These files, named 'KAKO OTKLJUČATI VAŠE DATOTEKE.txt' and 'KAKO OTKLJUČATI VAŠE DATOTEKE.log' ('HOW TO UNLOCK DATA'), demand the ransom payment and ask the victim to email the cybercrooks to the email address 'firstname.lastname@example.org' and provide their ID number and computer name. Computer users should refrain from contacting these people or paying the Godra Ransomware ransom.
Dealing with a Godra Ransomware Infection
The problem with contacting the people responsible for the Godra Ransomware is that these cybercrooks may ignore the victim or demand more money to restore the affected files. Furthermore, paying the large Godra Ransomware ransom allows them to continue creating and developing these threats. Instead of contacting them, malware researchers advise computer users to use file backup methods to restore the files affected by these attacks and an anti-malware program to remove the Godra Ransomware itself.