Threat Database Ransomware Poaz Ransomware

Poaz Ransomware

Infosec researchers have recently identified a highly perilous malware threat called the Poaz Ransomware. If it manages to infiltrate a system, this threat poses a significant risk and can lead to severe consequences. The emergence of Poaz is yet another alarming example of cybercriminals' ongoing efforts to develop new variants within the STOP/Djvu family of malware. It is crucial to remain vigilant as threats from this family typically come bundled with additional malicious payloads, such as infostealers like Vidar or RedLine.

The Poaz Ransomware employs an encryption algorithm that utilizes an unbreakable cryptographic method to lock down files stored on the targeted device. As a result, these files become entirely inaccessible to the user. Notably, Poaz appends a new extension, '.poaz,' to the original names of each encrypted file. Furthermore, the ransomware drops a ransom note in the form of a text file named '_readme.txt.' This note serves as a demand for a ransom fee in exchange for providing the decryption key necessary to restore access to the affected files.

Victims Of the Poaz Ransomware Lose Access to Their Data

The ransom note of the Poaz Ransomware emphasizes that a wide variety of files, including pictures, databases, documents, and other vital data, have been subjected to strong encryption. The threat actors state the files will not be recoverable without the proper decryption key that they possess.

To recover access to the locked files, the note specifies that the only viable option is to pay a ransom for a decryption tool and obtain the exclusive decryption key from the attackers. Initially, the cost of the demanded payment is set at $980.

However, there is a time-limited offer for the victims. If they establish contact with the attackers within the first 72 hours, they will supposedly receive a 50% discount, resulting in a reduced ransom amount of $490. To initiate communication with the attackers and proceed with the negotiation, the ransom note provides two email addresses that victims can use: and

Take Measures to Protect Your Devices and Data from Ransomware Threats

Protecting your devices and data from ransomware threats is crucial in today's digital landscape. Here are some essential measures you can take to enhance your cybersecurity and minimize the risk of falling victim to ransomware attacks:

  • Keep Software Updated: Update your operating system, anti-malware software, and applications regularly. Software updates often deliver security patches that address known vulnerabilities, making it harder for ransomware to exploit your system.
  •  Enable Two-Factor Authentication (2FA): Whenever possible, enable 2FA for your online accounts. This appends an extra layer of security by requiring another form of verification to access accounts, such as a code sent to your phone in addition to your password.
  •  Backup Your Data Regularly: Perform regular backups of your important files and data to an external hard drive or a secure cloud storage utility. By doing it, even if your files are encrypted by ransomware, you can restore them without paying the ransom.
  •  Use Caution with Email Attachments and Links: Be alert when accessing email attachments or clicking on links, especially from unknown or suspicious sources. Ransomware often spreads through phishing emails.
  •  Use Reliable Security Software: Invest in reputable anti-malware software to protect your devices from known threats and potential ransomware infections.
  •  Enable Firewall Protection: Ensure that your device's firewall is activated to prevent unauthorized access to your system.
  •  Educate Yourself and Your Team: Keep up with the latest ransomware threats and techniques. Educate yourself and your employees about the best practices for staying safe online.
  •  Be Wary of Remote Desktop Protocol (RDP) Usage: If using RDP, employ strong passwords and consider using a VPN for added security.
  •  Disable Macros in Office Documents: Disable macros in Microsoft Office documents, as they can be used to deliver malware.

By proactively implementing these measures, you can minimize the risk of becoming a victim of ransomware and defend your devices and data from potential threats. Remember, prevention and preparedness are key to maintaining a secure digital environment.

The ransom note dropped to devices infected by the Poaz Ransomware reads:


Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:

Reserve e-mail address to contact us:

Your personal ID:'


Most Viewed