Threat Database Ransomware Tgipus Ransomware

Tgipus Ransomware

The Tgipus Ransomware is created specifically to prevent users from accessing their own data. It does so via a strong encryption algorithm that will lock the files stored on the compromised system. The attackers then extort their victims who wish to restore their personal or business files. Tgipus is capable of affecting documents, archives, databases, images, audio and video files and more.

The Tgipus Ransomware marks the files it locks by changing their original names. More specifically, the threat appends '.tgipus' as a new file extension. A ransom note with instructions for the attackers will be delivered to the breached device. It will be placed on the desktop as a newly-created text file named 'RESTORE_FILES_INFO.txt).

Ransom Note's Overview

The hackers responsible for deploying the Tgipus Ransomware follow the trend of demanding a ransom payment using a cryptocurrency. However, instead of the most widespread Bitcoin, they want to be paid in Monero (XMR). Another distinguishing characteristic is that the note doesn't mention any email addresses that can be used as communication channels. Victims should instead use the provided TOX and Bitmessage accounts.

According to the note, the attackers are willing to prove their ability to restore the encrypted data. They offer affected users to send two files to be unlocked for free. The chosen files must be less than 1MB in size and should not contain important information.

The full text of the note is:

'::: Greetings :::

Little FAQ:
.1.
Q: Whats Happen?
A: Your files have been encrypted. The file structure was not damaged, we did everything possible so that this could not happen.

.2.
Q: How to recover files?
A: If you wish to decrypt your files you will need to pay in Monero(XMR) - this is one of the types of cryptocurrency, you can get acquainted with it in more detail here: hxxps://www.getmonero.org/

.3.
Q: What about guarantees?
A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests.
To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc… not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee.

.4.
Q: How to contact with you?
A: Please, write us to our qTOX account: A2D64928FE333BF394C79BB1F0B8F3E85AFE84F913135CCB481F0B13ADDDD1055AC5ECD33A05
You can learn about this way of communication and download it here: hxxps://qtox.github.io/
Or use Bitmessage and write to our address: BM-NC6V9JcMRuLPnSuPFN8upRPRRmHEMSFA
You can learn about this way of communication and download it here: hxxps://wiki.bitmessage.org/ and here: hxxps://github.com/Bitmessage/PyBitmessage/releases/

.5.
Q: How will the decryption process proceed after payment?
A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files.

.6.
Q: If I don’t want to pay bad people like you?
A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money.

:::BEWARE:::
DON'T try to change encrypted files by yourself!
If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files!
Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.

Key Identifier:

Number of files that were processed is:

PC Hardware ID:'

Trending

Most Viewed

Loading...