Threat Database Ransomware Syrk Ransomware

Syrk Ransomware

By GoldSparrow in Ransomware

An increasing number of cybercriminals are taking an interest in ransomware threats in particular. This is likely because they are often perceived as a way to make a quick buck at someone else's expense. One of the newest ransomware threats that experts have spotted is the Syrk Ransomware.

Propagation and Encryption

The propagation method employed by the authors of the Syrk Ransomware is not yet known. Some cybersecurity experts believe that the creators of this data-encrypting Trojan may be using some of the most common techniques for ransomware propagation – fake software updates, pirated copies of legitimate applications, and spam email campaigns containing macro-laced attachments. If you fall for the trickery of the Syrk Ransomware and give it access to your system, this threat will kick off the attack by performing a scan. The scan is meant to locate the files which the Syrk Ransomware will be encrypting. Then, the Syrk Ransomware will begin encrypting the targeted data. When a file is locked by the Syrk Ransomware its name will be changed. This file-locking Trojan appends a '. Syrk' extension to all the newly locked files. This means that a file previously called 'Onyx-Eyes.jpeg' will be renamed to 'Onyx-Eyes.jpeg. Syrk' when the encryption process is through.

The Ransom Note

In the next step of the attack, the Syrk Ransomware drops a ransom note. The note is called 'Readme_now.txt' and is very brief. It reads:

'Your personal files have been encrypted by Syrk Malware, send an email to panda831@protonmail.com to recover them.
Furthermore, the Syrk Ransomware presents the victim with a pop-up window containing a longer explanation regarding what happened to the user's files, which states:
*Your personal files are being encrypted by Syrk Malware. Your photos, videos, documents, etc... the only way to recover it is to contact this email: (panda831@protonmail.com) and submit your id.

After paying, you will be sent a password that will be used to decrypt your files
if you don't do these actions before the timer expires your files will start to be deleted
at the first timer the files in the photo folder will be deleted
at the second timer the files in the desktop folder will be deleted
at the third timer the files in the document folder will be deleted

So hurry up, TIME FLOWS!!!!

To see your Id click on *Show My ID*'

The authors of the Syrk Ransomware have given out an email address so that the victims can get in touch with them – 'panda831@protonmail.com.' The attackers also claim that they will begin deleting files if the victim does not pay up within two hours, and this is not an empty promise. Malware researchers that studied the code have determined that the Syrk Ransomware is fully capable of wiping off files.

We advise you to avoid any contact with cyber crooks. They are unreliable individuals and are likely not to provide you with a decryption key even if you pay the ransom fee. A safer solution is to download and install an anti-virus tool, which will erase all traces of the Syrk Ransomware from your system.

Trending

Most Viewed

Loading...