Threat Database Ransomware LOCKFILE Ransomware

LOCKFILE Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 2
First Seen: March 1, 2022
OS(es) Affected: Windows

The LOCKFILE Ransomware appears to be mostly targeting Russian-speaking users. The threat operates as expected for a ransomware threat - first, it infiltrated the targeted system, then it scans the present files on the machine, before encrypting nearly all of them with an uncrackable cryptographic algorithm. The LOCKFILE Ransomware is a threat from the Xorist Ransomware family.

Each file locked in this manner also will have '.LOCKFILE' added to its original name as a new file extension. To make sure that victims see its instructions, LOCKFILE shows ransom-demanding messages as two pop-up windows and a 'ДЕБЛОКИРОВКА ФАЙЛОВ.txt' file. All three are in Russian entirely.

Demands Overview

Victims who do not have the Cyrillic font package installed on their systems may experience errors while viewing the ransom note. A common occurrence is for the note to display gibberish and incomprehensible symbols. A rough translation of the notes, reveals that the cybercriminals give their victims 24 hours to establish communication. After that period is over, all encrypted files will supposedly be deleted and will no longer be recoverable. Victims also can experience loss of data if they input the wrong decryption code more than five times. Apparently, the only way to reach out to the attackers is via their email address at 'unlockmen@excite.com.'

The note in its original language is:

'Внимание! На вашем компьютере,обнаружено нелицензионное
программное обеспечение.Доступ к вашим файлам запрещен !
Чтобы восстановить свои файлы и получить к ним доступ,
свяжитесь с нашим отделом безопасности UNLOCKMEN@EXCITE.COM
Идентификатор 86548764 (130)
Ваш компьютер поставлен на таймер самоуничтожения 24 часа , по истечении этого времени вся информация будет безвозвратно стёрта. У вас есть 5 попыток ввода кода. При превышении этого количества, все данные необратимо удаляться. Будьте внимательны при вводе кода !
Заранее благодарим за оплату ! Мы ценим ваш вклад в развитие инновационно-технического прогресса.
'

SpyHunter Detects & Remove LOCKFILE Ransomware

File System Details

LOCKFILE Ransomware may create the following file(s):
# File Name MD5 Detections
1. file.exe 52e1fed4c521294c5de95bba958909c1 2

Related Posts

Trending

Most Viewed

Loading...