Threat Database Ransomware Tronas Ransomware

Tronas Ransomware

By GoldSparrow in Ransomware

The family of the .djvu Ransomware variants, which in turn is a variant of the STOP Ransomware, has expanded with a new member called Tronas Ransomware. It operates as a typical ransomware threat - it infiltrates the victim's computer, encrypts the most widely used file types rendering them unusable, and demands payment in exchange for the decryption key. Victims of this ransomware will notice that their files now have ".tronas" added as a new extension. The ransom note from the cybercriminals will be dropped in a text file called "_open_me.txt."

The note states that the affected users will have to pay $ to receive the private decryption key and decrypt tool for their files. This is a rather steep sum, but the criminals offer a 50% discount for users that contact them in the first 72 hours. Two emails are provided - "merosa@india.com" and "merosa@firemail.cc."

The content of the ransom note is:

’ATTENTION!

Don't worry my friend, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
https://we.tl/t-hK4tAv2Ed9
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:
merosa@india.com

Reserve e-mail address to contact us:
merosa@firemail.cc

Your personal ID:’

Although the ransom note states that there is no way to recover the encrypted files, victims of Trona still having some options. The easiest way is to restore the affected files is by using a backup that was created before the ransomware infection. Otherwise, they could try the STOP Ransomware decryptor created by the security researcher Michael Gillespie as it has been updated with two offline IDs for extensions ".drume," ".tronas," ".grovas" and ".trosak."

Trending

Most Viewed

Loading...