Vassago Ransomware Description
Named Vassago Ransomware, this threat aims to sneak itself onto users' computers, deploy an encryption routine and then extort its victims for money. The Vassago Ransomware belongs to the Makop Ransomware family and has been observed in the wild. Each file affected by Vassago will have its name modified drastically. The threat follows a complex pattern that includes a unique ID for the victims, an email address under the control of the hackers, and a specific file extension being appended to the original name of the locked file. The email address is 'email@example.com' while the new file extension is 'vassago.' Instructions for the victims will then be dropped in every folder containing locked files as text files named 'readme-warning.txt.'
The ransom note states that the hackers are willing to provide their victims with the decryption key necessary for the restoration of the data but only if they are paid an unspecified sum in Bitcoin. To start the process, affected users are told to send a message to either 'firstname.lastname@example.org' or 'email@example.com.' Two files that are less than 1MB in size can be attached to the email and will be decrypted for free. The files cannot be databases. The note concludes with several warnings.
The full text of the instructions provided by the Vassago Ransomware is:
'::: Greetings :::
Q: Whats Happen?
A: Your files have been encrypted and now have the "vassago" extension. The file structure was not damaged, we did everything possible so that this could not happen.
Q: How to recover files?
A: If you wish to decrypt your files you will need to pay in bitcoins.
Q: What about guarantees?
A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests.
To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc... not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee.
Q: How to contact with you?
A: You can write us to our mailbox: firstname.lastname@example.org or email@example.com
Q: How will the decryption process proceed after payment?
A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files.
Q: If I don’t want to pay bad people like you?
A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money.
DON'T try to change encrypted files by yourself!
If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files!
Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.'