Threat Database Ransomware ' File Extension' Ransomware

' File Extension' Ransomware

By GoldSparrow in Ransomware

The ' File Extension' Ransomware is an encryption ransomware Trojan that can be identified easily because the ' File Extension' Ransomware will add the file extension '' to each file affected by the attack. The ' File Extension' Ransomware follows a pattern typical of these infections, using an effective encryption algorithm to make the victim's files inaccessible and then ordering the payment of a ransom to be given the decryption key necessary to restore the affected files.

The Vicious Attack Perpetrated by the ' File Extension' Ransomware

The ' File Extension' Ransomware is typically delivered to the victim's computer through the use of corrupted Microsoft Word files attached to spam email messages. Once the ' File Extension' Ransomware has managed to enter a computer, it will begin encrypting the victim's files using a strong encryption algorithm. The ' File Extension' Ransomware will scan the victim's computer for the user-generated files, which may include files with the following file extensions:

.3gp, .7z, .apk, .avi, .bmp, .cdr, .cer, .chm, .conf, .css, .csv, .dat, .db, .dbf, .djvu, .dbx, .docm, .doc, .epub, .docx .fb2, .flv, .gif, .gz, .iso .ibooks,.jpeg, .jpg, .key, .mdb .md2, .mdf, .mht, .mobi .mhtm, .mkv, .mov, .mp3, .mp4, .mpg .mpeg, .pict, .pdf, .pps, .pkg, .png, .ppt .pptx, .ppsx, .psd, .rar, .rtf, .scr, .swf, .sav, .tiff, .tif, .tbl, .torrent, .txt, .vsd, .wmv, .xls, .xlsx, .xps, .xml, .ckp, .zip, .java, .py, .asm, .c, .cpp, .cs, .js, .php, .dacpac, .rbw, .rb, .mrg, .dcx, .db3, .sql, .sqlite3, .sqlite, .sqlitedb, .psd, .psp, .pdb, .dxf, .dwg, .drw, .casb, .ccp, .cal, .cmx, .cr2.

The ' File Extension' Ransomware attack's purpose is to make the victim's files inaccessible. Unfortunately, once the ' File Extension' Ransomware has compromised a file, it will become unrecoverable without the decryption key (which the con artists hold in their possession.)

The ' File Extension' Ransomware's Ransom Demands

The ' File Extension' Ransomware delivers its ransom note in a text file named 'help.txt.' The full text of the ' File Extension' Ransomware ransom note reads:

'Hello. Your files have been encrypted.

For help, write to this e-mail:
Attach to the letter 1-2 files (no more than 3 MB) and your personal key.

If within 24 hours you have not received a response, you need to follow the following instructions:
a) Download and install TOR browser: h[tt]ps://www.torproject[.]org/download/download-easy.html.en
b) From the TOR browser, follow the link: torbox3uiot6wchz[.]onion
c) Register your e-mail (Sign Up)
d) Write us on e-mail: rikkibarker@torbox3uiot6wchz.onion

ATTENTION: e-mail (rikkibarker@torbox3uiot6wchz.onion) accepts emails, only with e-mail registered in the TOR browser at torbox3uiot6wchz.onion

Your personal key:

There's nothing that can assure computer users that contacting the people responsible for the ' File Extension' Ransomware attack or paying the asked ransom will bring their data back. These people will demand payment of several hundred dollars but may fail to deliver a solution even if the victim pays the ransom amount. Furthermore, paying these ransoms allows the cybercrooks to continue developing threats like the ' File Extension' Ransomware.

Protecting Your Data from the ' File Extension' Ransomware

The best protection against threats like the ' File Extension' Ransomware is to have backup copies of your files. PC security researchers counsel computer users to have file backups stored on unmapped locations. Apart from file backups, a reliable security program that is fully updated should be installed and running on your computer. A security program can prevent the ' File Extension' Ransomware from being installed in the first place, intercepting the infection, and in the event of infection, it will be needed to remove the ' File Extension' Ransomware infection itself. Apart from file backups, make sure that your computer is not exposed to threats like the ' File Extension' Ransomware. Since the most common way of delivering these types of threats is through the use of spam email attachments, learning to handle this unsafe content safely is essential in preventing the ' File Extension' Ransomware infections.


Most Viewed