Threat Database Ransomware [tetty86@cock.li].video Ransomware

[tetty86@cock.li].video Ransomware

By GoldSparrow in Ransomware

The [tetty86@cock.li].video Ransomware is an encryption Trojan that is installed on the computers of users that click on corrupted advertisements, visit infected torrent websites or open spam email attachments from unknown sources. The goal of the [tetty86@cock.li].video Ransomware is to extort its victims by encrypting the user-generated files, which makes them useless and then offering to provide a decryption software so that the victims can have their compromised data back. They do not say how much this decryption tool will cost but warn that it will depend on how fast the victims respond to their demands and that the victims should use Bitcoins to make the payment. To render the encrypted files useless, they append a file extension, .video to the native file name. The [tetty86@cock.li].video Ransomware ransom note contains the email address that should be used to contact them and the victims' ID, which should be mentioned when contacting them. The text presented by the ransom note reads:

'All your files have been encrypted!
All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail tetty86@cock.li
Write this ID in the title of your message 1E857D00
In case of no answer in 24 hours write us to theese e-mails:ttetty86@cock.li
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files.
Free decryption as guarantee
Before paying you can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)
How to obtain Bitcoins
The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price.
hxxps://localbitcoins.com/buy_bitcoins
Also you can find other places to buy Bitcoins and beginners guide here:
hxxp://www.coindesk.com/information/how-can-i-buy-bitcoins/
Attention!
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.'

However, agreeing to contact the criminals and pay the ransom may not solve the problem even if they propose to decrypt one file for free to prove that they have the decryption software. Once they get the money, they can simply ignore the victims and even mark them for further attacks. Albeit it is always a negative experience to be infected by a threat like the [tetty86@cock.li].video Ransomware, computer users that follow security recommendations provided by experts will have backups of their files and should use it to reconstruct their data. If they don't have file backups, they should look for alternative recovery techniques. Whatever is the case, what should be avoided is to contact criminals or pay a ransom. Also, by having an updated security program can prevent infections like the [tetty86@cock.li].video Ransomware.

Trending

Most Viewed

Loading...