Threat Database Ransomware Symbiom Ransomware

Symbiom Ransomware

By GoldSparrow in Ransomware

The Symbiom Ransomware is an encryption ransomware Trojan that is used to extort computer users. The Symbiom Ransomware, like other similar ransomware Trojans, will make the victim's files inaccessible by encrypting them with a strong encryption algorithm. The Symbiom Ransomware will then demand the payment of a ransom from the victim in exchange for the decryption key necessary to recover the affected files. The Symbiom Ransomware and similar threats are a real threat to the victims' data, and computer users are urged to take strong precautions.

Stay Away from the Symbioses Proposed by this Ransomware

The Symbiom Ransomware is based on HiddenTear, an open source ransomware platform. Since its release in August 2015, HiddenTear has spawned countless encryption ransomware variants, most of which are identical to the Symbiom Ransomware. The Symbiom Ransomware has been customized to allow it to evade many anti-virus scanners, as well as affect the latest versions of the Windows operating system. The most common way of distributing the Symbiom Ransomware is via spam email attachments. The email attachments may take the form of Microsoft Word documents with corrupted macro scripts that download and install the Symbiom Ransomware onto the victim's computer system. The Symbiom Ransomware was first observed in the second week of August 2017.

How the Symbiom Ransomware Infection Works

After the Symbiom Ransomware is installed on the victim's computer, it connects to its Command and Control center to report information about the infected computer and the encryption used on the victim's data. The Symbiom Ransomware scans the victim's computer and encrypts data on all local drives, network shared drives, and remote memory devices connected to the infected PC. The Symbiom Ransomware uses a combination of the AES and RSA encryptions to make the victim's files unusable. During its attack, the Symbiom Ransomware also will delete the Shadow Volume Copies on the infected computer. The files encrypted in the Symbiom Ransomware attack can be identified easily because the Symbiom Ransomware will add the string '.symbiom_ransomware_locked' to the end of each affected file's extension. The Symbiom Ransomware will target files generated by the computer user, which include files such as photos, videos, audio, Microsoft Office documents, database, and numerous other file types. The Symbiom Ransomware will encrypt the victim's files but allow the Windows operating system to continue operating normally (so that the victim can view the ransom note and pay the ransom).

The Symbiom Ransomware’s Ransom Demands

The Symbiom Ransomware will demand a ransom payment after encrypting the victim's files. To do this, the Symbiom Ransomware will drop a text file on the victim's desktop. This file is named 'README_Ransomware_Symbiom.txt' and contains the following text:

'Your files have been locked by Symbiom!
Send 0.1 bitcoin (It is about 250 dollars) to : 13NjrGWP8GBRSWCgNBPYpPsGUfbyiYGnDc
Afterwards, send your bitcoin address which you payed with to : hackerz6924@tutanota.com
Don't worry. I will save your files if you pay.
GOOD LUCK!'

The ransom payment is equivalent to approximately 430 USD at the current exchange rate. Computer users should avoid paying the Symbiom Ransomware ransom or following the instructions in the Symbiom Ransomware ransom note. It is possible that the people responsible for the Symbiom Ransomware attack will not keep their word and restore the affected files. They are just as likely to ignore the ransom payment or demand more money. Paying the Symbiom Ransomware ransom also allows con artists to create more ransomware Trojans and make a living from this tactic.

Dealing with the Symbiom Ransomware

Instead of paying the Symbiom Ransomware ransom, computer users should restore their files from a backup. Backup copies of your files combined with a trusted security program and a good anti-spam filter can prevent the Symbiom Ransomware from entering your computer and are the best protection against the Symbiom Ransomware and other ransomware Trojans.

SpyHunter Detects & Remove Symbiom Ransomware

File System Details

Symbiom Ransomware may create the following file(s):
# File Name MD5 Detections
1. file.exe 89ef6b98c7e352d6b23573bd6d008298 0

Trending

Most Viewed

Loading...