Threat Database Ransomware '.lightning File Extension' Ransomware

'.lightning File Extension' Ransomware

By GoldSparrow in Ransomware

The '.lightning File Extension' Ransomware is an encryption ransomware Trojan that is related to the Everbe 2.0 Ransomware, a ransomware threat that has several recent variants. There is very little to differentiate the '.lightning File Extension' Ransomware from its predecessors in its ransomware family, and it only features very small modifications to its delivery systems and obfuscation. The '.lightning File Extension' Ransomware attack is typically carried out using corrupted spam email attachments, online advertisements and unsafe software downloads.

This lightning will Spread a Dark Light over Your Files

The '.lightning File Extension' Ransomware, like most encryption ransomware Trojans, is designed to take the victim's files hostage. To do this, the '.lightning File Extension' Ransomware uses an encryption algorithm that will make the victim's files inaccessible. The following are examples of the files that threats like the '.lightning File Extension' Ransomware will target:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

Malware like the '.lightning File Extension' Ransomware generally targets the user-generated files, and try to keep the Windows running so that the victim can see a ransom note and pay a ransom. The '.lightning File Extension' Ransomware will mark the damaged files with the file extension '.[youhaveonechance@cock.li].lightning,' which will be added to each compromised file's name. Once the victim's files have been damaged by the '.lightning File Extension' Ransomware, this ransomware Trojan will deliver a ransom note. The '.lightning File Extension' Ransomware's ransom note takes the form of a text file named '!=How_to_decrypt_files=!.txt,' which it will show on the infected computer's desktop. The '.lightning File Extension' Ransomware ransom note's content should be ignored and paying the ransom demand by the criminals should be avoided.

Dealing with the '.lightning File Extension' Ransomware Trojan

The criminals typically demand payments of thousands of dollars in exchange for the decryption key and may have no intention of helping the victims recover their data after the attack. The best protection one can have against the '.lightning File Extension' Ransomware is to prevent this threat from entering the computer in the first place, by using a strong security program and keeping it safe when browsing the Web. Since after the '.lightning File Extension' Ransomware finishes encrypting the files it may not be possible to restore them, it is extremely necessary to have the means to restore any files compromised by these attacks. This is what makes PC security researchers counsel computer users have backup copies of all their data and store these backup copies in a safe location, such as the cloud or an independent device.

Trending

Most Viewed

Loading...