Threat Database Ransomware 'sprosinas@cock.li' Ransomware

'sprosinas@cock.li' Ransomware

By GoldSparrow in Ransomware

The 'sprosinas@cock.li' Ransomware is an encryption ransomware Trojan. The 'sprosinas@cock.li' Ransomware seems to target computer users based in Russia or Russian speaking locations. The 'sprosinas@cock.li' Ransomware carries out a typical encryption ransomware attack, making the victim's files inaccessible to demand a ransom payment in exchange for the decryption key needed to restore the affected data.

How the 'sprosinas@cock.li' Ransomware Attack Works

The 'sprosinas@cock.li' Ransomware targets the user-generated files, encrypting them by using a strong encryption algorithm. The 'sprosinas@cock.li' Ransomware, unlike many other encryption ransomware Trojans, does not rename the victim's files or mark them with new extensions after they have been encrypted. The 'sprosinas@cock.li' Ransomware, however, carries out a typical version of the encryption ransomware tactic, encrypting the victim's files and then delivering a ransom note written in Russian contained in a text file named 'Your files are now encrypted.txt.' The following are examples of the files that the 'sprosinas@cock.li' Ransomware targets in its attack:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar,

The 'sprosinas@cock.li' Ransomware seems to be related with other existing encryption ransomware Trojans, such as Buhtrap Ransomware. The 'sprosinas@cock.li' Ransomware uses a code signature linked to a company titled 'VERY EXCLUSIVE LTD,' clearly a fake company. The 'sprosinas@cock.li' Ransomware's ransom note claims that the victims should contact the criminals via two provided email addresses and that they should send one or two small files and a personal ID contained in the 'sprosinas@cock.li' Ransomware's ransom note.

Dealing with the 'sprosinas@cock.li' Ransomware Infection

Computer users that contact the criminals responsible for the 'sprosinas@cock.li' Ransomware attack can end up very disappointed. Furthermore, computer users should refrain from paying any ransom linked to the 'sprosinas@cock.li' Ransomware or follow the criminal's instructions. Criminals carrying out these attacks typically have no intention of helping the victims to recover their data, and paying the ransom will often expose the computer users to additional tactics or attacks or, in the best of cases, they will simply be ignored, and the criminals will pocket the ransom payment. Instead of paying the 'sprosinas@cock.li' Ransomware ransom, computer users should use backup copies of their files to recover any compromised data. Having backup copies of all data and storing these on protected places is the best way to ensure that the data is safe from threats like the 'sprosinas@cock.li' Ransomware or the many threats that carry out identical attacks and are active today. Apart from file backups, a reliable security program that is fully up-to-date should be present at all times.

Trending

Most Viewed

Loading...