Threat Database Ransomware Google Ransomware

Google Ransomware

Cybersecurity researchers have discovered a new ransomware variant that they dubbed 'Google.' They found that the Google Ransomware is designed to encrypt files. Along with the file encryption, the threat also delivers a ransom note called 'read_it.txt,' which instructs the victim on how to pay the ransom. Additionally, the Google Ransomware appends the '.google' extension to the filenames of the encrypted files. For example, a file named '1.png' would be renamed to '1.png.google', and '2.doc' would be renamed to '2.doc.google.' Note that this ransomware has no affiliation with the Google company. Furthermore, the threat has been confirmed to belong to the Chaos Ransomware family.

The Google Ransomware Demands Victims to Pay a Hefty Sum as Ransom

The ransom note serves as a warning to victims that their computers have been infected with ransomware and all their files have been encrypted. To retrieve their files, the victims must purchase special decryption software for $24,622.70, which is only payable in Bitcoin. The note also implies that failure to pay the ransom will result in permanent loss of access to the encrypted files. To facilitate the payment, the ransom note provides a Bitcoin address.

In most cases, the victims of ransomware are unable to decrypt their files without the assistance of cybercriminals. They are often coerced into buying decryption tools from the threat actors unless they have a data backup or a third-party decryption tool. However, it is not advisable to pay cybercriminals for decryption, as there is a high risk of being tricked. Even after payment, the victims may not always receive the promised decryption tool.

Security Measures that can Protect Your Devices from Threats Like Google Ransomware

To protect their devices from ransomware infections, users can take several security measures, such as keeping their operating systems and applications up-to-date, using reputable anti-malware software, and avoiding suspicious emails and websites. They also should avoid opening suspicious email attachments, clicking on unknown links, or downloading unauthorized software. Keeping a regular backup of their essential data also is necessary to protect against ransomware attacks, as it allows users to restore their files without having to pay the ransom. Additionally, users should create strong and unique passwords and enable two-factor authentication whenever possible to prevent unauthorized access to their accounts. Finally, educating themselves about ransomware attacks and staying aware of the latest security threats is paramount to be able to recognize and avoid potential ransomware attacks.

The full text of the ransom note left to the victims of Google Ransomware is:

'All of your files have been encrypted
Your computer was infected with a ransomware virus. Your files have been encrypted and you won't
be able to decrypt them without our help.What can I do to get my files back?You can buy our special
decryption software, this software will allow you to recover all of your data and remove the
ransomware from your computer.The price for the software is $24,622.70. Payment can be made in Bitcoin only.
How do I pay, where do I get Bitcoin?
Purchasing Bitcoin varies from country to country, you are best advised to do a quick google search
yourself to find out how to buy Bitcoin.
Many of our customers have reported these sites to be fast and reliable:
Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com

Payment informationAmount: 2.1473766 BTC
Bitcoin Address: 17CqMQFeuB3NTzJ2X28tfRmWaPyPQgvoHV'

Related Posts

Trending

Most Viewed

Loading...