'email@example.com' Ransomware Description
The 'firstname.lastname@example.org' Ransomware is a ransomware Trojan that belongs to the same ransomware family of the Matrix Ransomware. The code we refer to as 'email@example.com' Ransomware may be recognized by other security providers as Pedant Ransomware and Matrix-Pedant Ransomware. The 'firstname.lastname@example.org' Ransomware was first observed on February 13, 2019. The 'email@example.com' Ransomware attack has several variants, all carrying out a typical encryption ransomware Trojan attack. These attacks consist of a threat that encrypts the victims' files to take them hostage and then demand ransom payments in exchange for the means to restore the affected files.
Why You Should Avoid a 'firstname.lastname@example.org' Ransomware Attack
The 'email@example.com' Ransomware is typically delivered to the victims via corrupted spam email attachments, often in the form of Microsoft Office files with embedded macro scripts that download and install the 'firstname.lastname@example.org' Ransomware onto the victim's computer. The targets of the 'email@example.com' Ransomware are the user-generated files, which may include a wide variety of media files, documents, and other data, such as the files with the following file extensions:
.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.
The 'firstname.lastname@example.org' Ransomware encrypts the files and marks them with the file extension '.PEDAN,' as well as the string 'email@example.com' added to the beginning of each file's name.
The 'firstname.lastname@example.org' Ransomware's Ransom Demands
The 'email@example.com' Ransomware delivers a ransom note in the form of an RTF file dropped on the infected computer's desktop. The text displayed in the 'firstname.lastname@example.org' Ransomware's ransom note reads:
'HOW TO RECOVER YOUR FILES?
WE HAVE TO INFORM YOU THAT ALL YOUR FILES WERE ENCRYPTED!
PLEASE BE SURE THAT YOUR FILES ARE NOT BROKEN! Your files were encrypted with AES-128+RSA-2048 crypto algorithms.
* Please note that there is no way to decrypt your files without unique decryption key and special software. Your unique decryption key is securely stored on our server.
* Please note that all the attempts to recover your files by yourself or using third party tools will result only in irrevocable loss of your data!
* Please note that you can recover files only with your unique decryption key, which stored on our server.
HOW TO RECOVER FILES? Please write us to the e-mail, we will send you instruction how to recover your data.
Our main e-mail: PedantBack@protonmail.com
Our secondary e-mail: PedantBack@tutanota.com
Our secondary e-mail: PedantBack@cock.li'
Security experts strongly advise computer users to refrain from contacting the criminals responsible for the 'email@example.com' Ransomware attack or following any of the instructions in the 'firstname.lastname@example.org' Ransomware ransom note. Instead, computer users should replace all the files compromised by the 'email@example.com' Ransomware with backup copies. This is why file backups, stored on a safe location such as the cloud or an external device, are the best protection against threats like the 'firstname.lastname@example.org' Ransomware.
Do You Suspect Your PC May Be Infected with 'email@example.com' Ransomware & Other Threats? Scan Your PC with SpyHunterSpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like 'firstname.lastname@example.org' Ransomware as well as a one-on-one tech support service. Download SpyHunter's FREE Malware Remover
Security Doesn't Let You Download SpyHunter or Access the Internet?Solutions: Your computer may have malware hiding in memory that prevents any program, including SpyHunter, from executing on your computer. Follow to download SpyHunter and gain access to the Internet:
- Use an alternative browser. Malware may disable your browser. If you're using IE, for example, and having problems downloading SpyHunter, you should open Firefox, Chrome or Safari browser instead.
- Use a removable media. Download SpyHunter on another clean computer, burn it to a USB flash drive, DVD/CD, or any preferred removable media, then install it on your infected computer and run SpyHunter's malware scanner.
- Start Windows in Safe Mode. If you can not access your Window's desktop, reboot your computer in "Safe Mode with Networking" and install SpyHunter in Safe Mode.
- IE Users: Disable proxy server for Internet Explorer to browse the web with Internet Explorer or update your anti-spyware program. Malware modifies your Windows settings to use a proxy server to prevent you from browsing the web with IE.
This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your PC. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.