Threat Database Ransomware Video Ransomware

Video Ransomware

By GoldSparrow in Ransomware

The Video Ransomware is one more addition to the Dharma Ransomware family, which is used by the cybercriminals to compromise its victims' files so that its perpetrators can demand a ransom payment to share a decryption software, which supposedly they keep in their possession. To make the victims' files unreachable, the criminals handling the Video Ransomware use a powerful encryption algorithm to compromise them and adds the .video file extension to their names. Then, the Video Ransomware will present the user with a ransom note, which will appear on their desktops as a pop-up window and reads:

'All your files have been encrypted!
All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail tetty86@cock.li
Write this ID in the title of your message 1E857D00
In case of no answer in 24 hours write us to theese e-mails:ttetty86@cock.li
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files.
Free decryption as guarantee
Before paying you can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)
How to obtain Bitcoins
The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price.
hxxps://localbitcoins.com/buy_bitcoins
Also you can find other places to buy Bitcoins and beginners guide here:
hxxp://www.coindesk.com/information/how-can-i-buy-bitcoins/
Attention!
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.'

The Video Ransomware can infect a computer when its user clicks on corrupted advertisements, email attachments from unchecked, unknown sources, torrent websites and other infection vectors used by these threats. The ransom note contains two email addresses, tetty86@cock.li and ttetty86@cock.li, and the users' ID, which should be mentioned when contacting the criminals responsible for the attack. However, it is not a good choice to contact these people and paying the ransom is even worse because the chances to waste your money are high since the objective of the perpetrators of the attack is to get your money, not restore your data. Therefore, it is advised to disregard their instructions, remove the Video Ransomware infection from your computer with an anti-malware product and use a backup to restore your files.

Related Posts

Trending

Most Viewed

Loading...