Threat Database Ransomware Recoverfile@protonmail.com Ransomware

Recoverfile@protonmail.com Ransomware

By GoldSparrow in Ransomware

The Recoverfile@protonmail.com Ransomware is a fairly generic encryption ransomware Trojan. The Recoverfile@protonmail.com Ransomware was first observed in June 2018, and there is very little to differentiate the Recoverfile@protonmail.com Ransomware from the many other encryption ransomware Trojans that are operative currently. The Recoverfile@protonmail.com Ransomware carries out a typical attack of this type, using the AES and RSA encryption to make the victim's files inaccessible and then demands a ransom payment to restore the affected files.

How the Recoverfile@protonmail.com Ransomware Attacks a Computer

The Recoverfile@protonmail.com Ransomware is not entirely new. Previous versions of the Recoverfile@protonmail.com Ransomware have been released, including ransomware Trojans known as 'Iron' and 'Maktub', released earlier in 2018. The Recoverfile@protonmail.com Ransomware is an advanced threat, and recovery from a successful attack can be impossible without file backups. The Recoverfile@protonmail.com Ransomware includes obfuscation features and self-protection mechanisms that allow it to detect when it is running in a sandbox or virtual environment. The Recoverfile@protonmail.com Ransomware, like most encryption ransomware Trojans, will scan the victim's computer in search of the user-generated files. The Recoverfile@protonmail.com Ransomware will avoid the system files and will encrypt media files, documents, databases, and other user-generated content. The files that are often targeted by threats like the Recoverfile@protonmail.com Ransomware include:

.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip.

The Recoverfile@protonmail.com Ransomware and Its Ransom Note

Once the Recoverfile@protonmail.com Ransomware has encrypted the victim's files, the Recoverfile@protonmail.com Ransomware will deliver a ransom note. This ransom note is contained in an HTA application that displays a program window named 'RECOVER FILES.' The 'Recoverfile@protonmail.com Ransomware ransom note contains the following message:

'WARNING!
Your personal files are encrypted.
Your documents, photos, databases and other important files have been encrypted with strongest encryption and unique key, generated for this computer. Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key.
Open [follow links to TOR-based sites]
in your browser. They are public gates to the secret server. The website can help you complete the decryption work automatically. You could also send 0.05 BTC to 12uo5vXD6YmT7tkYorRE5RAcx7tZGAdv2K and contact this email recoverfile@protonmail.com with below ID.
Write in the following personal ID in the input from on server:
[twenty-four random characters]'

Computer users are counseled not to pay the Recoverfile@protonmail.com Ransomware ransom. There is no way to force the criminals to restore the affected files, and it is certain that they will target the victims who pay for additional attacks. Furthermore, paying these ransoms allows the criminals to continue creating and distributing threats like the Recoverfile@protonmail.com Ransomware.

Protecting Your Data from Threats Like the Recoverfile@protonmail.com Ransomware

The best protection against threats like the Recoverfile@protonmail.com Ransomware is to have file backups stored on external devices or the cloud. File backups enable computer users to replace any files compromised by the Recoverfile@protonmail.com Ransomware with a backup copy. Apart from this, computer users should use a strong, fully updated security program to protect their computers from attacks like the Recoverfile@protonmail.com Ransomware.

Trending

Most Viewed

Loading...