Threat Database Ransomware Phreaker Ransomware

Phreaker Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 4
First Seen: October 6, 2022
Last Seen: March 1, 2023
OS(es) Affected: Windows

The Phreaker Ransomware is malware based on a ransomware strain very e popular among cybercriminals, known as the Chaos Ransomware. Threats of this type are used to specifically target the data on the breached devices and render them completely unusable. Ransomware threats achieve this hurtful goal by running an encryption process with a sufficiently strong cryptographic algorithm. Restoration of the affected files is typically impossible without having the correct decryption keys.

When Phreaker is executed on an infected system, it will encrypt the documents, archives, databases, PDFs, and many other file types. Most ransomware threats mark the files they lock by attaching a specific file extension to the original file names. However, Phreaker operates in a different way - it appends the file names with a different randomly generated 4-character string. Finally, a ransom note is delivered inside a text file named 'read_it.txt.'

Phreaker's ransom note states that its victims must pay $100 to the attackers. The money must be sent to the provided crypto-wallet address using the Bitcoin cryptocurrency. In addition, the confirmation of the transaction must be sent to an email address controlled by the hackers. In exchange, victims are promised to receive the necessary decryption keys and a decryptor key. However, the ransom note doesn't contain the exact email addresses and instead has a placeholder. This means that even if victims decide to make the ransom payment, they will still have no way to restore the locked data.

The full text of Phreaker Ransomware's message is:

'Phreaker malware has infected your machine.
Lucky for you this is based out of America and we pride ourseleves on helping you get your files back.

Send a small bitcoin payment off 100$ to
19DpJAWr6NCVT2oAnWieozQPsRK7Bj83r4

Email @protonmail of your payment and public key to recieve your private key and decryptor.'

SpyHunter Detects & Remove Phreaker Ransomware

File System Details

Phreaker Ransomware may create the following file(s):
# File Name MD5 Detections
1. file.exe f4f13a5e6735a9d891a242e8d2f5c57e 2

Trending

Most Viewed

Loading...