Threat Database Ransomware Tron Ransomware

Tron Ransomware

By GoldSparrow in Ransomware

The Tron Ransomware is an encryption ransomware Trojan that was first observed in April 2018. The Tron Ransomware uses a strong encryption algorithm to make the victims pay a large ransom to restore the files enciphered by the attack. The Tron Ransomware targets the user-generated files, seems to target English speakers, and was created in Kazakhstan. The Tron Ransomware will attempt to detect the location of its victim's computer and will not infect computers that have a Russian keyboard layout.

The Tron Ransomware can Damage Numerous File Type

There is not much to differentiate the Tron Ransomware from the many other encryption ransomware Trojans that are being used to carry out attacks currently. The Tron Ransomware is delivered through compromised spam email attachments, often through damaged Microsoft Word files that use embedded macro scripts to download and install this threat on the victim's computer. The Tron Ransomware will target the user-generated files, which may include a wide variety of document types. The following are some of the file types that are commonly encrypted in attacks similar to the Tron Ransomware:

.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip.

The Tron Ransomware will make the encrypted files very easy to be recognized because they will be marked with the file extension '.tron,' which will be added to the name of the affected file. The Tron Ransomware will deliver a ransom note in the form of an HTA application named 'Tron,' which is dropped on the infected computer's desktop after the files are encrypted. The Tron Ransomware ransom note delivers the following text:

'All your files are encrypted
What happened to my computer?
Your important files are encrypted.
Many of your documents, photos, videos, databases and other files are no longer accessible because they have been encrypted.
Maybe you are busy looking for a way to recovery your files, but do not waste your time.
Nobody can recover your files without our decryption service.
Can i Recover my Files?
Sure, We guarantee that you can recover II your files safely and easily.
But you have not so enough time.
You have only have 10 days to submit the payment.
Also, if you don't pay in 10 days, you won't be able to recover your files forever.
How Do I pay?
Payment is accepted in bitcoin only. For more inforrmation, click "How to buy Bitcoin". Please check the current price of bitcoin and buy some bitcoins.
And send the correct amount to the address specifiled in the window.
After your payment you need to write to us on mail.
We will decrypt your files.
We strongly recommend you to not remove this software, and disable your anti-virus for a while, until! you pay and the payment gets processed, if your anti-virus gets updated and removes this software autmatically, it will not be able to recover your files even if you pay!
Amount 0.05 [ Copy ]
Bitcoin address DzNaZiWzBwUr8ymWHcSzbYGidutRNDuEs [Copy|BUTTON]
EMAIL supportjron @gmail .com [Copy|BUTTON]
[HOW TO BUY BITCOIN|BUTTON]'

Protecting Your Data from the Tron Ransomware

The best protection from the Tron Ransomware is to have file backups. An up-to-date security program is also indispensable. Since the Tron Ransomware is often delivered in spam email messages, learning to handle these content safely is also essential in preventing the Tron Ransomware attacks.

Related Posts

Trending

Most Viewed

Loading...