Threat Database Ransomware '.icp File Extension' Ransomware

'.icp File Extension' Ransomware

By GoldSparrow in Ransomware

The '.icp File Extension' Ransomware is an encryption ransomware Trojan. The '.icp File Extension' Ransomware, like most threats of this type, is used to keep the victims' files locked up and then demand a ransom payment from the victim in exchange for restoring access to the compromised data. This is why security researchers strongly advise that computer users take steps to protect their data from threats like the '.icp File Extension' Ransomware.

Why the '.icp File Extension' Ransomware Should be Feared

The '.icp File Extension' Ransomware can reach a victim in many ways. These delivery methods may include corrupted email attachments, bogus online downloads or social engineering techniques. Once the '.icp File Extension' Ransomware has been installed onto the victim's computer, it will carry out its attack, making the victim's files inaccessible. To do this, the '.icp File Extension' Ransomware uses a strong encryption algorithm, AES, to target the user-generated files. The '.icp File Extension' Ransomware attack may target a wide variety of document types, including videos, databases, PDF files, Microsoft Office files, configuration files, and numerous other file types. The known samples of the files that threats like the '.icp File Extension' Ransomware target in these attacks include:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The '.icp File Extension' Ransomware's Ransom Demand

The '.icp File Extension' Ransomware delivers a ransom note in the form of a text file named 'Restore_ICPICP_Files.tx,' which contains a ransom demand for the victim. The content of the '.icp File Extension' Ransomware ransom demand is displayed below:

'Attention!
Do not rename the ciphered files
Do not try to decrypt your data with the help of the third-party software, it can cause constant data loss.
If you, your programmers or your friends help you to decrypt your files - it can lead to data loss.
You do not joke with files.
My email decrypter02@cumallover.me,piterpen02@keemail.me'

The '.icp File Extension' Ransomware's ransom note's instructions should be ignored and contacting the criminals responsible for the '.icp File Extension' Ransomware attack, in any way, is not recommended.

Dealing with a '.icp File Extension' Ransomware Attack

The best protection from an '.icp File Extension' Ransomware attack is to have file backups. Having backup copies of your files and storing these in secure locations is the best protection against threats like the '.icp File Extension' Ransomware. Apart from file backups, computer users are instructed to have a security program capable of intercepting the '.icp File Extension' Ransomware before their files are compromised.

Trending

Most Viewed

Loading...