Threat Database Ransomware Repter Ransomware

Repter Ransomware

By GoldSparrow in Ransomware

Repter Ransomware is the name of a new file-encrypting Trojan that has been identified by malware experts. According to security analysts, the Repter Ransomware is a variant of the Fonix Ransomware. Cybercriminals often use already established data-lockers as a basis to create new ransomware threats as this saves them both time and effort.

Propagation and Encryption

Data-encrypting Trojans, like the Repter Ransomware, are often spread via fake emails. Cybercriminals create cleverly worded emails that would either contain a malicious attached file or a misleading link. Some cyber crooks opt to use malicious ads, torrent trackers, bogus social media pages, and fraudulent application updates to distribute file-lockers like the Repter Ransomware. When the Repter Ransomware infects your PC, it will begin scanning your files. Threats like the Repter Ransomware are usually programmed to target filetypes, which are likely to be found on the system of any regular users. This means that the Repter Ransomware will go after your images, audio files, videos, documents, presentations, spreadsheets, databases, archives, and many other filetypes. The Repter Ransomware uses an encryption algorithm to lock the targeted data. All the files locked by the Repter Ransomware will have their names changed. This is because the Repter Ransomware adds a '.EMAIL=[repter@tuta.io]ID=[].repter' extension to the names of all the encrypted files. For example, a file originally named 'rice-paper.png' will be renamed to 'rice-paper.png.EMAIL=[repter@tuta.io]ID=[].repter.'

The Ransom Note

The Repter Ransomware drops a ransom note on the user's computer. The name of the file is 'How To Decrypt.hta.' The attackers offer to decrypt up to three files free of charge, provided that they do not contain important information. The attackers do not make it clear what the ransom fee is. However, they mention that users who contact them within 48 hours will get a 50% discount. The authors of the Repter Ransomware offer their contact details – ‘repter@tuta.io' and ‘repter@elude.in.'

It is best to ignore the demands of cybercriminals. Do not waste your money on the empty promises of cyber crooks like the authors of the Repter Ransomware. You should consider investing in a genuine, up-to-date anti-malware solution that will swiftly and safely remove the Repter Ransomware from your PC.

Trending

Most Viewed

Loading...