Threat Database Ransomware TXTME Ransomware

TXTME Ransomware

As cyber threats grow more sophisticated, ransomware continues to pose a significant risk to personal users, businesses, and institutions worldwide. One of the latest and most dangerous variants, the TXTME Ransomware, exemplifies how attackers exploit system vulnerabilities and social engineering to encrypt data and extort money. To avoid becoming the next victim, understanding how this threat works and how to defend against it is essential.

Inside TXTME: A Look at the Ransomware’s Behavior

The TXTME Ransomware belongs to the Dharma family, known for its data encryption attacks and high-pressure extortion tactics. Once inside a system, TXTME locks user files and renames them with a unique identifier, the attacker's contact email, and the '.TXTME' extension. For instance:

1.png becomes 1.png.id-9ECFA84E.[ownercall@tuta.io].TXTME

2.pdf becomes 2.pdf.id-9ECFA84E.[ownercall@tuta.io].TXTME

Victims are presented with two ransom notes: a desktop pop-up and a 'TXTME.txt' file. These notes warn the victim that their files have been encrypted and instruct them to contact the attacker via email ('ownercall@tuta.io' or 'ownercall@mailum.com'). The attacker demands Bitcoin in exchange for decryption tools and cautions against renaming files or using third-party recovery software, threatening permanent data loss.

Methods of Infection and System Manipulation

Once deployed, TXTME takes aggressive measures to prevent recovery and maintain its presence:

  • Disables the system firewall, lowering defenses against further attacks.
  • Deletes the Shadow Volume Copies, removing any built-in backup data that could be used to recover lost files.
  • Copies itself to the %LOCALAPPDATA% directory and adds registry entries to ensure it runs automatically on startup.
  • Gathers basic location data to avoid infecting systems in specific countries — typically those associated with the attackers.

It spreads through common attack vectors, including phishing emails, fraudulent advertisements, cracked software, infected USB drives, and exposed Remote Desktop Protocol (RDP) services, especially those with weak or reused passwords.

Strengthen Your Defenses: Best Practices to Prevent Ransomware

Defending against sophisticated threats like TXTME requires a proactive and multi-layered strategy. A strong foundation begins with securing your system and network. Ensuring that your operating system and all software are updated with the latest patches is essential to close known vulnerabilities. It's also critical to use reputable anti-malware software with real-time protection enabled, which can help detect and block unsafe activity before it causes harm. 

System access should be tightly controlled by regulating administrative privileges to only those who absolutely need them. Additionally, disabling macros in Office documents can prevent many standard malware payloads from executing. If Remote Desktop Protocol (RDP) is not in use, it should be disabled entirely. However, if remote access is required, it must be secured with strong, unique passwords, multi-factor authentication, and ideally, routed through a virtual private network (VPN).

Equally important is maintaining awareness and a reliable backup strategy. Essential files should be regularly backed up and stored either offline or in secure cloud environments that are not directly accessible from the main system.

Staying away from pirated software and unofficial tools, as well as steering clear of questionable websites, helps minimize exposure to ransomware vectors. Lastly, ongoing monitoring of network activity can provide early warning signs of intrusion attempts, such as brute-force login efforts or unusual file access patterns.

Conclusion: Stay Alert, Stay Protected

The TXTME Ransomware campaign illustrates the growing sophistication and destructiveness of modern cyber threats. It disables recovery tools, encrypts valuable files, and demands cryptocurrency as ransom, all while ensuring it can remain active on compromised systems. However, with diligent security practices and a commitment to user awareness, it is possible to prevent such infections and respond effectively if they occur. Cybersecurity is no longer optional; it's a necessary investment in your digital safety.

Messages

The following messages associated with TXTME Ransomware were found:

All your files have been encrypted!
Don't worry, you can return all your files!
If you want to restore them, write to the mail: ownercall@tuta.io YOUR ID -
If you have not answered by mail within 12 hours, write to us by another mail:ownercall@mailum.com
Free decryption as guarantee
Before paying you can send us up to 3 files for free decryption. The total size of files must be less than 3Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)
How to obtain Bitcoins

Also you can find other places to buy Bitcoins and beginners guide here:
hxxp://www.coindesk.com/information/how-can-i-buy-bitcoins/
Attention!
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Ransom message shown as a text file:

all your data has been locked us

You want to return?

write email ownercall@tuta.io or ownercall@mailum.com

Trending

Most Viewed

Loading...