Threat Database Ransomware Vapor Ransomware

Vapor Ransomware

By GoldSparrow in Ransomware

Threat Scorecard

Threat Level: 100 % (High)
Infected Computers: 3
First Seen: November 20, 2018
Last Seen: July 23, 2019
OS(es) Affected: Windows

The Vapor Ransomware is an encryption ransomware Trojan that first appeared on November 17, 2018. The criminals distribute the Vapor Ransomware through corrupted spam email attachments. Once the Vapor Ransomware is installed, the Vapor Ransomware uses a strong encryption algorithm to take over the victim's computer and makes the victim's files inaccessible. The Vapor Ransomware's attack is designed to extract a ransom from the victim in exchange for restoring access to the compromised data.

How the Vapor Ransomware Attack Works

The Vapor Ransomware uses a strong encryption algorithm to make the victim's files inaccessible, targeting the user-generated files, which may include a wide variety of file types. The Vapor Ransomware marks all files encrypted by its attack by adding the file extension '.Vapor' to the end of each compromised file's name. The Vapor Ransomware targets the following file types in its infection process:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The Vapor Ransomware's Ransom Messages

The Vapor Ransomware delivers a ransom note in the form of a program window named 'Vapor Ransomware' after it has finished encrypting the victim's files. The Vapor Ransomware's ransom note contains the following message:

'Vapor Ransomware
You Have Been Caught.
You Cannot Run.
You Cannot Hide.
You Aren't Safe Here.
What Happened to Me?
All your private data, files. cookies. application and much more as been encrypted into a strong encryption!
The only way to get it hack is by sending a support email at this email:
deadhacksteem@gmail.com
Please make sure your Client ID is included so we can recognise you and send hack the key.
When its done. enter the key into the key box and enjoy your day I night.
You have 48 hours to send the email. if the timer runs out your files will be deleted.
If you restart the PC or kill the program. you will never be
able to get your files baek since they will be re-encrypted ii you re-launch the program.
Basically closing the program in anyway will result in loosing the key.
- Good Luck. Good Time.
DeaDHackS Team!
Total Files: [random number]
[I Give Up|BUTTON]
Key: [TEXT BOX] [CHECK KEY|BUTTON]
TIMER: [48 HOUR COUNTDOWN]
Big Thanks To:
Ghostly / DeadDHackS :Creating Encryption / Timer / Design!'

The Vapor Ransomware also delivers its ransom note in a text file named 'readme.txt,' which contains the following message:

'All your private data, files, cookies, application and much more as been encrypted into a strong encryption!
The only way to get it back is by sending a support email at this email:
deadhacksteam@gmail.com
Please make sure your Client ID is included so we can recognise you and send back the key.
Hhen its done, enter the key into the key box and enjoy your day I night.
You have 48 hours to send the email, if the timer runs out your files will be deleted.
If you restart the PC or kill the program, you will never be
able to get your files back since they will be re-encrypted if you re-launch the program.
Basically closing the program in anyway will result in loosing the key.
- Good Luck, Good Time.
- DeaDHackS Team!'

The recommendation from the specialists is that computer users refrain from contacting the criminals responsible for the Vapor Ransomware infection. Computer users should use backup copies to restore any files compromised by the Vapor Ransomware attack.

Related Posts

Trending

Most Viewed

Loading...