Threat Database Ransomware Purge Ransomware

Purge Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 321,801
First Seen: August 18, 2016
OS(es) Affected: Windows

The Purge Ransomware is an encryption ransomware Trojan that uses the RSA encryption to encrypt its victims' files. The Purge Ransomware identifies files that have been encrypted by adding the extension '.the Purge' to each file's name. After encrypting the victim's files, the Purge Ransomware displays its ransom note, contained in the file 'How to restore files.hta'. Unfortunately, it is not possible to decrypt the files encrypted by the Purge Ransomware without access to the decryption key, which the con artists responsible for the Purge Ransomware hold hostage until the victim pays the ransom.

Infected Computer Users should Abstain from Paying the Purge Ransomware Ransom

The Purge Ransomware ransom note claims that its victims have to contact the con artists at a specific email address (powerbase@tutanota.com) to receive instructions for payment. The Purge Ransomware demands ransoms that are between 1 and 3 BitCoins (between $600 and $1800 USD at the average exchange rate), making it particularly expensive to recover from a Purge Ransomware attack. It isn't a smart choice pay the Purge Ransomware's ransom. There is no guarantee that the con artists responsible for the Purge Ransomware will keep their word and deliver the decryption key; it is equally possible that they will turn around and ask for more money. Unfortunately, since it is not possible to restore the files without the decryption key, the best method computer users can use is to recover their files from a backup. This is, in fact, the best prevention method for dealing with the Purge Ransomware, having adequate backups of all files on an external memory device.

How Threats Like the Purge Ransomware Work

Threats like the Purge Ransomware are becoming very popular online. Most ransomware Trojans are very similar to each other, particularly because they may recycle code from one threat to the other. Virtually, the only practical differences are the size of the ransom demanded from the victims. The most common distribution methods for threats like the Purge Ransomware are corrupted email attachments, fake software updates, programs distributed through P2P networks, and hacking of victim's computers directly. Making sure that your computer is protected adequately with a reliable security program and that you exercise caution when dealing with possible infection sources can help prevent the Purge Ransomware attacks and other, similar infections. The ransom note displayed by the Purge Ransomware says:

YOUR FILES HAVE BEEN ENCRYPTED!
Your files have been been encrypted with a powerfull strain of a virus called ransomware. Your files are encrytped using rsa encryption, the same standard used by the military and banks. It is currently impossible to decrypt files encrypted with rsa encryption.
Lucky for you, we can help. We are willing to sell you a decryptor UNIQUELY made for your computer (meaning someone else's decryptor will not work for you). Once you pay a small fee, we will instantly send you the software/info neccessary to decrypt all your files, quickly and easilly.
In order to get in touch with us email us at powerbase@tutanota.com.In your email write your personal ID (its located at the up of the page, it is a string of random characters). Once we receive your personal ID, we will send you payment instructions.
As proff we can decrypt you files we may decrypt 1 small file for test.
If you dont get answer from powerbase@tutanota.com in 10 hours
Register here: hxxp://bitmsg.me
Write to adress BM-2cUrKsazEKiamN9cZ17xQq9c5JpRpokca5 with you email and personal ID
When you payment will bee confirmed, You will get decrypter of files on you computer. After you run decrypter software all you files will be decryped and restored. Do not try restore files without our help, this is useless and you may lose data permanetly. Decrypters of others clients are unique and work only on PC with they personal ID. We can not keep your decryption keys forever, meaning after 1 week after you have been infected, if you have not paid, we will not be able to decrypt your files. Email us as soon as you see this message, we know exactly when everyone has been encrypted and the longer you wait, the higher the payment gets.

SpyHunter Detects & Remove Purge Ransomware

File System Details

Purge Ransomware may create the following file(s):
# File Name MD5 Detections
1. How to restore files.hta 79be0364e192cd51d9eed6456e04ec8c 33,313
2. How to restore files.hta 1ce48a99cc0080873a169c0dda89eaeb 32,102
3. How to restore files.hta 9866f94d944b7219e09125f5fa9c386d 26,077
4. How to restore files.hta 800f4638ac7099002eb53350fdc09065 22,138
5. How to restore files.hta 627ffb608f2334addeb24ab0f3cb9b68 20,049
6. How to restore files.hta 0aa0c8328e6c27cd72217df2f6df942b 3,020
7. How to restore files.hta 8f561c8f460cadd868c213f05431a4a6 1,568
8. How to restore files.hta ec547da37f11500c4d875de6d4ec05d0 1,445
9. How to restore files.hta 76f8e696d4aaebb55f52fc682a4f024a 776
10. How to restore files.hta fae3e858aec555b6cf9677c1e71c29dd 679
11. How to restore files.hta 165f6f9ac498beb6acf29db65123c29e 672
12. How to restore files.hta 138e80dce60a3b175b1574b22b906ec5 290
13. How to restore files.hta d9d9e1829c4bff35ca02d7a54a19ad27 167
14. How to restore files.hta 66ee38046b0c91e1c1ff6326fff0045f 110
15. How to restore files.hta 79964050bff59a91ea8d75d49a77eb8b 17
16. How to restore files.hta 1bee72f78939060fa5f0aa976b077429 15
17. How to restore files.hta ccb446f3baf61c75d7cff45c07bfd1e8 15
18. How to restore files.hta 839a15974cafa30e57f4f243d856345b 8
19. How to restore files.hta 359acd482ac2d1203faacb27a8f804e8 8
20. How to restore files.hta e949180e002c6bcb4206e6b23f8172de 8
21. How to restore files.hta c76b29a51cdd075cb88524b428a30269 7
22. How to restore files.hta a863aab9e3c19f27caeb82123b158fd6 7
23. How to restore files.hta d30f3d7286412da7d50f801ef745427d 7
24. How to restore files.hta 9a03103dc07038ea6d88782bf2132196 7
25. How to restore files.hta 1d57c5170a0ea007c5469d9f68f77d00 3
26. How to restore files.hta a6fdb021151c57678dded333bf84b2af 3
27. How to restore files.hta eb39adb2ae5807ad0872ae92d67097a7 3
28. How to restore files.hta a0994be397c79fd447e874f21ce29666 1
29. How to restore files.hta 3a10dacf4bc2e6bce441f67abd4ff1ef 1
30. How to restore files.hta adf092f8b356d0808d6755c7c5fcb754 1
More files

Trending

Most Viewed

Loading...