Threat Database Ransomware Scarab-Tokog Ransomware

Scarab-Tokog Ransomware

By GoldSparrow in Ransomware

The Scarab-Tokog Ransomware Trojan is a variant in the Scarab family of ransomware, a large family of encryption ransomware Trojans. The Scarab-Tokog Ransomware, like most encryption ransomware Trojans, makes the victim's files inaccessible and then demands a ransom payment to provide access to the compromised data. The Scarab-Tokog Ransomware variant was released in April 2019 and carries out a typical version of the ransomware tactic. The Scarab-Tokog Ransomware Trojan is a variant in the Scarab family of ransomware, a large family of encryption ransomware Trojans.

The Scarab-Tokog Ransomware Affects Numerous File Types

The Scarab-Tokog Ransomware uses AES encryption to make the victim's files inaccessible. A file encrypted by the Scarab-Tokog Ransomware attack will have its name replaced with random characters and the file extension '.tokog' added to its name. The Scarab-Tokog Ransomware targets the user-generated files, which may include files with the following file extensions:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The Scarab-Tokog Ransomware delivers a ransom note in the form of a text file named 'HOW TO RECOVER ENCRYPTED FILES.TXT,' which delivers the following message:

"====================================
Warning read this carefully!!!!!!
====================================
All your files are encrypted
Your personal identifier
6A02000000000000***9EAD3E
Your documents, photos, databases, save games and other important data were encrypted.
Data recovery requires a decryptor.
To receive the decryptor, you should send an email to the email address: anticrypto@protonmail.com.
In the letter, indicate your personal identifier (see the beginning of this document).
Next, you pay the cost of the decryptor. In the reply letter you will receive the address
Bitcoin-purse, to which you need to transfer money.
If you do not have bitocoins you can buy Bitcoin:
https://localbitcoins.com/ru/buy_bitcoins(Visa/MasterCard, QIWI Visa Wallet ....)
Also you can use any convenient way for you to buy bitcoin
When the money transfer is confirmed, you will receive a file decryption for your computer.
After starting the decryption program, all your files will be restored.
Attention!
* Do not attempt to uninstall the program or run antivirus software
* Attempts to self-decrypt files will result in the loss of your data
* Decoders of other users are incompatible with your data, as each user unique encryption key."

Dealing with a Scarab-Tokog Ransomware Infection

Paying the Scarab-Tokog Ransomware ransom or contacting the criminals responsible for Scarab-Tokog Ransomware is not a recommended move. Preventive measures should instead be taken against these attacks. The best prevention against these threats includes the use of file backup measures and installing a reliable security program that is fully up-to-date.

Trending

Most Viewed

Loading...