Mosk Ransomware Description
The Mosk Ransomware is one of the newest ransomware threats that have emerged on the Web. Much like other threats of this type, the Mosk Ransomware targets a user’s files, encrypts them, and then blackmails the victim into paying them cash. Upon studying this new ransomware threat, malware experts uncovered that it belongs to the infamous STOP Ransomware family. This ransomware family has, undoubtedly, been the most active one in the whole of 2019.
Propagation and Encryption
It has not yet been disclosed how the attackers are propagating the Mosk Ransomware. It is likely that the authors of this threat are utilizing mass spam email campaigns, fraudulent software updates, and bogus pirated variants of popular applications as infection vectors for distributing the Mosk Ransomware. Once a system is compromised by this file-locking Trojan, a brief scan will be performed. The goal of this scan is to locate the files, which the Mosk Ransomware was programmed to target. Usually, this would be a long list of file types as ransomware threats make sure to cause maximum damage to the infiltrate machine. Next, the encryption process of the Mosk Ransomware will begin. Once a file gets locked by this threat, its file name will be changed as the Mosk Ransomware appends a ‘.mosk’ extension. For example, an audio file called ‘Celtic-Eyes.mp3’ will be renamed to ‘Celtic-Eyes.mp3.mosk’ once the Mosk Ransomware has applied its encryption algorithm.
The Ransom Note
When the encryption process has been completed successfully, the Mosk Ransomware will drop a ransom note on the victim’s desktop. The note’s name is ‘_readme.txt,’ which is a trademark of the STOP Ransomware family. In the note, the attackers say that the ransom fee is $980, but all users who contact them within 72 hours will only have to pay half the price, meaning the ransom fee will be dropped to $490. To prove to the victims that they are capable of helping them recover the locked files, the attackers offer to unlock one file free of charge. The authors of the Mosk Ransomware demand to be contacted via email – ‘firstname.lastname@example.org’ and ‘email@example.com.’
Malware researchers warn against getting in touch with cyber crooks like the ones responsible for the Mosk Ransomware. These are unscrupulous individuals who will take your money gladly and may never provide the decryption key they promise. This is why, instead, you should use a reputable anti-malware solution to remove the Mosk Ransomware from your system once and for all.
Do You Suspect Your PC May Be Infected with Mosk Ransomware & Other Threats? Scan Your PC with SpyHunterSpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Mosk Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Security Doesn't Let You Download SpyHunter or Access the Internet?Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.