Threat Database Ransomware 'help@decrypt-files.info' Ransomware

'help@decrypt-files.info' Ransomware

By GoldSparrow in Ransomware

PC security analysts first observed the 'help@decrypt-files.info' Ransomware, an encryption ransomware Trojan, on October 28, 2018. The 'help@decrypt-files.info' Ransomware is a hybrid of Dharma and Crysis, two well-known ransomware families. In the fall of 2018, malware analysts have noticed the appearance of several new ransomware Trojans that belong to this category, hybridizing threats from both families executing a new attack. The 'help@decrypt-files.info' Ransomware is designed to take the victims' files hostage, encrypt them to make them out of reach to demand a ransom payment in exchange for the decryption key needed to restore the affected files.

How the 'help@decrypt-files.info' Ransomware Enters a Computer

The 'help@decrypt-files.info' Ransomware is often delivered to the victim through corrupted spam email attachments. These email attachments often take the form of PDF or DOCX files with embedded macro scripts that download and install the 'help@decrypt-files.info' Ransomware onto the victim's computer. After the 'help@decrypt-files.info' Ransomware is installed, this ransomware threat uses the AES and RSA encryptions to make the victim's files inaccessible. The 'help@decrypt-files.info' Ransomware will target the user-generated files in its attack, which may include files with the following extensions:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The 'help@decrypt-files.info' Ransomware's encryption method will make the files it encrypts to be unrecoverable and easy to be identified because the 'help@decrypt-files.info' Ransomware will add the file extension '.id-<8 chars>.[help@decrypt-files.info].gdb' to each affected file's name. The 'help@decrypt-files.info' Ransomware will then deliver a ransom note demanding a ransom payment in Bitcoin to release the access to the affected files. Ignoring this ransom demand from the criminals, you will follow the advice of the experts because a lot of times the criminals will not help the victims of the 'help@decrypt-files.info' Ransomware recover their data. Besides, paying these ransoms allows the criminals to continue creating and distributing threats like the 'help@decrypt-files.info' Ransomware.

Protecting Your Data from Threats Like the 'help@decrypt-files.info' Ransomware

Although the 'help@decrypt-files.info' Ransomware can be removed with the help of a security program that is fully up-to-date, it is not possible to restore the files encrypted by the 'help@decrypt-files.info' Ransomware without the decryption key currently. This is why the best protection against threats like the 'help@decrypt-files.info' Ransomware is to have the means to recover any data compromised by the attack. Computer users that have backup copies of their files stored on the cloud or another unmapped location can get back their compromised data easily. Another protection against threats like the 'help@decrypt-files.info' Ransomware is to have disk images, which can allow computer users to replace any drives compromised by a 'help@decrypt-files.info' Ransomware attack. Apart from file backups, it is necessary to protect your computer from typical delivery methods associated with the 'help@decrypt-files.info' Ransomware, such as spam email attachments and corrupted online advertisements.

Trending

Most Viewed

Loading...