Threat Database Ransomware Masterlock@india.com Ransomware

Masterlock@india.com Ransomware

By CagedTech in Ransomware

The 'Masterlock@india.com' Ransomware is a variant of the infamous Crysis Ransomware Trojan. This threat was first observed in March of 2016. The 'Masterlock@india.com' Ransomware is being used to trick computer users by encrypting their files and then asking for the payment of a ransom. Unfortunately, it may not be possible to decrypt the files that have been encrypted by using the 'Masterlock@india.com' Ransomware infection currently.

The 'Masterlock@india.com' Ransomware and Its Ransom Note

The 'Masterlock@india.com' Ransomware uses a lock screen that simply reads: 'To get the key, write to the 'Masterlock@india.com' over a blue background with a large picture of a padlock in the middle. According to reports from victims of the 'Masterlock@india.com' Ransomware infection, computer users that have written to this email have received the following response:

Hello, dear friend!
We are writing to inform you that our team of network security specialists has analyzed your system and has identified vulnerabilities in the protection.
We kindly draw your attention that defensive operation on your computer is not running properly and now the whole database is at risk.
All your files are encrypted and can not be accepted back without our professional help.
Obviously vulnerability analysis, troubleshooting, decoding the information and then ensuring safety are not a simple matter.
And so our high-grade and quick service is not free.
Please note that today the price of your files recovery is 3 Bitcoins, but next day it will cost 5 Bitcoins.
You should buy bitcoins here https://localbitcoins.com/faq
Read the paragraphs:
1. How to buy Bitcoins?
2. How do I send Bitcoins and how can I pay with Bitcoins after buying them?
The Bitcoin wallet for payment is 12yDGpp82ejLqT6GbE4qAPtCYAKRpksbWd
After the transfer of bitcoins please send email with screenshot of the payment page.
We does not advise you to lose time, because the price will encrese with each passing day.
As proof of our desire and readiness to help you, we can decipher a few of your files for test.
To check this you can upload any 1 encrypted file on web site dropmefiles.com, size no more than 10 MB (only 1 text file or a photo) and send us a download link.
Certainly after payment we guarantee prompt solution of the problem, decrypt the database to return to its former condition and consultation how to secure the rules of the system safety.
Kind regards, Master Lock.

Note that the 'Masterlock@india.com' Ransomware message claims that the victim's computer was infected and that they are providing a valuable 'defensive service.' Of course, the con artists delivering this message are the ones responsible for the infection in the first place.

The 'Masterlock@india.com' Ransomware Claims that it Wants to Help Ironically

Ransomware Trojans like the 'Masterlock@india.com' Ransomware are simple to understand. They encrypt the victim's files using a strong encryption method and then demand that the victim pays a ransom. The type of ransom demand can vary, from those threats – like this one – that claim that they are providing some service, to the ones that outright threaten the victim. There have been countless variants of this hoax in recent years. The 'Masterlock@india.com' Ransomware targets the following file types during its attack:

.odc, .odm, .odp, .ods, .odt, .docm, .docx, .doc, .odb, .mp4, sql, .7z, .m4a, .rar, .wma, .gdb, .tax, .pkpass, .bc6, .bc7, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps.

PC security analysts advise not paying the ransom. Preventive measures are important for dealing with the 'Masterlock@india.com' Ransomware. The best course of action is to ensure that your files are backed up properly and that you always use a reliable security program to protect your computer from intruders.

Trending

Most Viewed

Loading...