Threat Database Ransomware Ransomware Ransomware

When computer users open spam emails, they can bring various infection kinds to their machines, including a threatening ransomware infection, such as the Ransomware. If the Ransomware infects a computer successfully, it will encipher a large portion of the victims' files, such as audio files, video files, images, documents and much more, and change their names to make them inaccessible. The Ransomware also will:

  • Append a file extension to the locked files names.
  • Drop its ransom note.
  • Take measures to keep persistence on the infected machine.

Security researchers did not find any evidence linking the Ransomware to any ransomware family so that looks like it is an independent threat. Ransomware threats can cause numerous problems to the infected machines, as well as their owners and the Ransomware is not an exception. Its ransom-demanding message does not mention the amount that should be paid nor the currency that should be used. However, it provides the email address, which should be used within the next 12 hours and a Telegram address, so the victims can contact the attackers.

Computer users that are enduring a Ransomware infection should not consider contacting these people. There are many ransomware victims that paid the asked ransom and got nothing in return because criminals are only after money, not to keep their deals or promises. The best they can do is to search for alternative decryption methods or use a recent backup to recover the compromised data.

The ransom message of the Ransomware is:


Most Viewed