Threat Database Ransomware 'tater@mail2tor.com' Ransomware

'tater@mail2tor.com' Ransomware

By GoldSparrow in Ransomware

The 'tater@mail2tor.com' Ransomware Trojan is also known as 'Tater Ransomware' and is an encryption ransomware Trojan that carries out a typical attack of this type. The 'tater@mail2tor.com' Ransomware was first observed on April 16, 2019, taking the victims' files hostage and then demanding a ransom payment. The 'tater@mail2tor.com' Ransomware carries out an effective ransomware attack, and malware researchers counsel computer users to take precautions against this and other, similar malware threats.

What is the Objective of the 'tater@mail2tor.com' Ransomware Trojan

Typically, the 'tater@mail2tor.com' Ransomware is delivered to victims via corrupted spam email tactics, generally as attachments in the form of Microsoft Word or PDF files with embedded macro scripts that download and install the 'tater@mail2tor.com' Ransomware onto the victim's computer. Once installed, the 'tater@mail2tor.com' Ransomware uses the AES and RSA encryptions to make the victim's files unreachable, targeting a wide variety of file types that include various documents, databases, and many media files. The following are examples of the files that threats like the 'tater@mail2tor.com' Ransomware target in these attacks:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The 'tater@mail2tor.com' Ransomware attack marks the files it affects with the file extension '.tater' that is added to each affected file's name. After encrypting the victim's files, the 'tater@mail2tor.com' Ransomware delivers a ransom note in the form of a text file named '#RECOVERY_FILES#.txt,' which contains the following message for the victim:

'!!!!!!!Your files are encrypted!!!!!!!
Do not try to recover your files on your own or with someone else, because after the intervention you can remain without your data forever.
You have 48 hours to contact us, otherwise you will be left without access to the files forever.
Perhaps you are busy looking for a way to recover your files, but don't waste your time. Nobody can recover your files without our decryption service
Only we can decrypt all your data!
Contact us:
tater@mail2tor.com
And tell us your unique ID'

Protecting Your Data from Threats Like the 'tater@mail2tor.com' Ransomware

The best protection against threats like the 'tater@mail2tor.com' Ransomware is to have file backups stored in a reliable location, such as the cloud or an external memory device. Computer users should refrain from paying any ransom or following the instructions in the 'tater@mail2tor.com' Ransomware's ransom note. Apart from file backups, PC security researchers advise computer users to have a trustworthy security program installed on their computers that can be used to intercept these threats.

Trending

Most Viewed

Loading...