'pedantback@protonmail.com' Ransomware

'pedantback@protonmail.com' Ransomware Description

The 'pedantback@protonmail.com' Ransomware is a ransomware Trojan that belongs to the same ransomware family of the Matrix Ransomware. The code we refer to as 'pedantback@protonmail.com' Ransomware may be recognized by other security providers as Pedant Ransomware and Matrix-Pedant Ransomware. The 'pedantback@protonmail.com' Ransomware was first observed on February 13, 2019. The 'pedantback@protonmail.com' Ransomware attack has several variants, all carrying out a typical encryption ransomware Trojan attack. These attacks consist of a threat that encrypts the victims' files to take them hostage and then demand ransom payments in exchange for the means to restore the affected files.

Why You Should Avoid a 'pedantback@protonmail.com' Ransomware Attack

The 'pedantback@protonmail.com' Ransomware is typically delivered to the victims via corrupted spam email attachments, often in the form of Microsoft Office files with embedded macro scripts that download and install the 'pedantback@protonmail.com' Ransomware onto the victim's computer. The targets of the 'pedantback@protonmail.com' Ransomware are the user-generated files, which may include a wide variety of media files, documents, and other data, such as the files with the following file extensions:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The 'pedantback@protonmail.com' Ransomware encrypts the files and marks them with the file extension '.PEDAN,' as well as the string 'pedantback@protonmail.com' added to the beginning of each file's name.

The 'pedantback@protonmail.com' Ransomware's Ransom Demands

The 'pedantback@protonmail.com' Ransomware delivers a ransom note in the form of an RTF file dropped on the infected computer's desktop. The text displayed in the 'pedantback@protonmail.com' Ransomware's ransom note reads:

PLEASE BE SURE THAT YOUR FILES ARE NOT BROKEN! Your files were encrypted with AES-128+RSA-2048 crypto algorithms.
* Please note that there is no way to decrypt your files without unique decryption key and special software. Your unique decryption key is securely stored on our server.
* Please note that all the attempts to recover your files by yourself or using third party tools will result only in irrevocable loss of your data!
* Please note that you can recover files only with your unique decryption key, which stored on our server.
HOW TO RECOVER FILES? Please write us to the e-mail, we will send you instruction how to recover your data.
Our main e-mail: PedantBack@protonmail.com
Our secondary e-mail: PedantBack@tutanota.com
Our secondary e-mail: PedantBack@cock.li'

Security experts strongly advise computer users to refrain from contacting the criminals responsible for the 'pedantback@protonmail.com' Ransomware attack or following any of the instructions in the 'pedantback@protonmail.com' Ransomware ransom note. Instead, computer users should replace all the files compromised by the 'pedantback@protonmail.com' Ransomware with backup copies. This is why file backups, stored on a safe location such as the cloud or an external device, are the best protection against threats like the 'pedantback@protonmail.com' Ransomware.

Do You Suspect Your Computer May Be Infected with 'pedantback@protonmail.com' Ransomware & Other Threats? Scan Your Computer with SpyHunter

SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like 'pedantback@protonmail.com' Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover*

One Comment

  • fariz:

    Can you repair my files lost because decrypt of 'pedantback@protonmail.com' Ransomware

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.