Threat Database Ransomware 'pedantback@protonmail.com' Ransomware

'pedantback@protonmail.com' Ransomware

By GoldSparrow in Ransomware

The 'pedantback@protonmail.com' Ransomware is a ransomware Trojan that belongs to the same ransomware family of the Matrix Ransomware. The code we refer to as 'pedantback@protonmail.com' Ransomware may be recognized by other security providers as Pedant Ransomware and Matrix-Pedant Ransomware. The 'pedantback@protonmail.com' Ransomware was first observed on February 13, 2019. The 'pedantback@protonmail.com' Ransomware attack has several variants, all carrying out a typical encryption ransomware Trojan attack. These attacks consist of a threat that encrypts the victims' files to take them hostage and then demand ransom payments in exchange for the means to restore the affected files.

Why You Should Avoid a 'pedantback@protonmail.com' Ransomware Attack

The 'pedantback@protonmail.com' Ransomware is typically delivered to the victims via corrupted spam email attachments, often in the form of Microsoft Office files with embedded macro scripts that download and install the 'pedantback@protonmail.com' Ransomware onto the victim's computer. The targets of the 'pedantback@protonmail.com' Ransomware are the user-generated files, which may include a wide variety of media files, documents, and other data, such as the files with the following file extensions:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The 'pedantback@protonmail.com' Ransomware encrypts the files and marks them with the file extension '.PEDAN,' as well as the string 'pedantback@protonmail.com' added to the beginning of each file's name.

The 'pedantback@protonmail.com' Ransomware's Ransom Demands

The 'pedantback@protonmail.com' Ransomware delivers a ransom note in the form of an RTF file dropped on the infected computer's desktop. The text displayed in the 'pedantback@protonmail.com' Ransomware's ransom note reads:

'HOW TO RECOVER YOUR FILES?
WE HAVE TO INFORM YOU THAT ALL YOUR FILES WERE ENCRYPTED!
PLEASE BE SURE THAT YOUR FILES ARE NOT BROKEN! Your files were encrypted with AES-128+RSA-2048 crypto algorithms.
* Please note that there is no way to decrypt your files without unique decryption key and special software. Your unique decryption key is securely stored on our server.
* Please note that all the attempts to recover your files by yourself or using third party tools will result only in irrevocable loss of your data!
* Please note that you can recover files only with your unique decryption key, which stored on our server.
HOW TO RECOVER FILES? Please write us to the e-mail, we will send you instruction how to recover your data.
Our main e-mail: PedantBack@protonmail.com
Our secondary e-mail: PedantBack@tutanota.com
Our secondary e-mail: PedantBack@cock.li'

Security experts strongly advise computer users to refrain from contacting the criminals responsible for the 'pedantback@protonmail.com' Ransomware attack or following any of the instructions in the 'pedantback@protonmail.com' Ransomware ransom note. Instead, computer users should replace all the files compromised by the 'pedantback@protonmail.com' Ransomware with backup copies. This is why file backups, stored on a safe location such as the cloud or an external device, are the best protection against threats like the 'pedantback@protonmail.com' Ransomware.

1 Comment

Can you repair my files lost because decrypt of 'pedantback@protonmail.com' Ransomware

Trending

Most Viewed

Loading...