Threat Database Ransomware 'suppfirecrypt@qq.com' Ransomware

'suppfirecrypt@qq.com' Ransomware

By GoldSparrow in Ransomware

The 'suppfirecrypt@qq.com' Ransomware is an encryption ransomware Trojan. The 'suppfirecrypt@qq.com' Ransomware's code is a hybrid of two known ransomware Trojan families: the Dharma 2017 and Crysis. In the fall of 2018, PC security researchers have observed a large number of variants in this hybrid family being used to attack computers. The 'suppfirecrypt@qq.com' Ransomware and other variants in this ransomware family, like most encryption ransomware Trojans, are designed to take victims' files hostage and then demand a ransom payment to restore access to the compromised files.

How You Will Know that Your PC was Infected by the 'suppfirecrypt@qq.com' Ransomware

The 'suppfirecrypt@qq.com' Ransomware is typically delivered using corrupted spam email attachments, often in the form of DOCX and PDF files with embedded macro scripts. Once the 'suppfirecrypt@qq.com' Ransomware has been installed, it uses the AES and RSA encryption to make the victim's files inaccessible. The 'suppfirecrypt@qq.com' Ransomware targets a wide variety of file types of the user-generated files in its attack, which may include files with the following file extensions:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.'all your data has been locked us
You want to return?
write email suppfirecrypt@qq.com'

PC security specialists strongly advise computer users to refrain from contacting the criminals responsible for the 'suppfirecrypt@qq.com' Ransomware attack. Instead, preemptive steps should be taken to ensure that their data is safe from these attacks and that it can be recovered if it becomes inaccessible after a 'suppfirecrypt@qq.com' Ransomware infection.

Protecting Your PC from Infections Like the 'suppfirecrypt@qq.com' Ransomware

The best protection against threats like the 'suppfirecrypt@qq.com' Ransomware is to have file backups. If computer users have security copies of their files and these copies are stored in a place that the threat can't reach, such as the cloud or an external memory device, then recovering from a the 'suppfirecrypt@qq.com' Ransomware attack is as straightforward as restoring the compromised data by replacing it with the backup copies. Unfortunately, once the 'suppfirecrypt@qq.com' Ransomware has caused a file to become inaccessible, it will be impossible to decrypt without the decryption key (which the criminals hold in their possession). Apart from file backups, it is crucial that computer users install a dedicated anti-malware program that is fully up-to-date, capable of intercepting and removing these infections. Because the 'suppfirecrypt@qq.com' Ransomware is commonly delivered using corrupted spam email attachments, learning to recognize these unsafe contents to prevent being infected is essential in these attacks.

Trending

Most Viewed

Loading...