Threat Database Ransomware Pthh Ransomware

Pthh Ransomware

An analysis of the Pthh Ransomware has uncovered its method of encrypting data on the victim's computer. It also alters the filenames of the affected files by adding the '.pthh' extension. To illustrate, if the original file name was '1.jpg,' Pthh transforms it into '1.jpg.pthh.' Additionally, this ransomware generates a ransom note in the form of a file named '_readme.txt.'

It's essential to be aware that the Pthh Ransomware is affiliated with the notorious STOP/Djvu Ransomware family. Victims must understand that cybercriminals often deploy supplementary malware alongside the ransomware. These additional threats are typically information-collecting tools, such as RedLine or Vidar. Consequently, if you find yourself falling victim to the Pthh Ransomware, it is of utmost importance to take immediate action. This involves isolating the infected computer and undertaking efforts to eliminate the ransomware and any other potential malware that may have infiltrated the system.

Victims of the Pthh Ransomware Will Be Extorted for Money

The ransom note exhibited to the victims of the Pthh Ransomware discloses their avenue to communicate with the perpetrators via two provided email addresses: '' and '' As per the note's instructions, victims seeking to retrieve the decryption software and key required for restoring their encrypted data are required to make a ransom payment. The ransom options presented are either $980 or a discounted rate of $490 if victims reach out to the attackers within a 72-hour timeframe.

It is essential to grasp that in the majority of cases, data encrypted by ransomware can solely be restored using a specific tool furnished by the attackers themselves. Nevertheless, it is strongly discouraged to make the ransom payment. There is no assurance that the attackers will uphold their end of the bargain by providing the decryption tool, even after the ransom is remitted.

Furthermore, it's critical to acknowledge that numerous ransomware threats have the capability to propagate to other computers within the compromised local network, encrypting files on those devices as well. Hence, taking prompt action to eradicate any trace of ransomware from afflicted systems is highly recommended. This proactive measure serves to prevent further damage and the potential encryption of additional files within the network.

It is Crucial to Establish Sufficient Protection against Malware Threats on Your Devices

To effectively safeguard their data and devices from the ever-present menace of ransomware, users should adopt a multifaceted approach by proactively implementing a range of crucial measures. These steps collectively bolster their digital security and resilience against this pervasive threat:

  • Regular Data Backups: An essential measure is the consistent backup of critical data and files. This practice ensures that even if the original data is encrypted or compromised by ransomware, a clean and uncorrupted copy can be promptly restored from the backups. Regular backups are a critical safety net.
  •  Software and System Maintenance: Users should diligently keep their operating systems, software, and anti-malware programs up to date. The regular installation of security updates and patches is vital in addressing vulnerabilities that ransomware often exploits to infiltrate a system. This ongoing maintenance is an effective preventive measure.
  •  Reputable Security Software and Firewalls: Utilizing reputable security software and firewalls provides an additional layer of defense against ransomware threats. These security tools are designed to detect and block potential ransomware attacks, identifying and quarantining malicious files or activities. They act as sentinels guarding against unauthorized intrusions.
  •  User Education: Knowledge is a powerful weapon in the battle against ransomware. Staying informed about the latest ransomware techniques and attack vectors empowers users to recognize potential threats and avoid falling victim to social engineering tactics. Educated users are more likely to exercise caution and make informed decisions when faced with suspicious content or messages.

By integrating these measures into their cybersecurity practices, users create a comprehensive defense against ransomware threats. This multifaceted approach not only protects their data and devices but also bolsters their resilience in the face of potential harm. As ransomware continues to evolve, these proactive steps become increasingly critical in ensuring the security and integrity of digital assets.

The full text of the ransom note created by the Pthh Ransomware threat is:


Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:

Reserve e-mail address to contact us:

Your personal ID:'

Pthh Ransomware Video

Tip: Turn your sound ON and watch the video in Full Screen mode.


Most Viewed