Wwty Ransomware

Cybersecurity experts have identified a ransomware variant known as Wwty. This threatening software employs file encryption techniques to restrict users' access to their files and adds the '.wwty' extension to their filena

Cybersecurity experts have identified a ransomware variant known as Wwty. This threatening software employs file encryption techniques to restrict users' access to their files and adds the '.wwty' extension to their filenames. For example, '1.jpg' would be transformed into '1.jpg.wwty' after Wwty has encrypted it.

In addition to file encryption, Wwty creates a ransom note as a '_readme.txt' text file. Typically, this note contains instructions on how to make a ransom payment in exchange for obtaining the decryption key. Wwty is a member of the STOP/Djvu Ransomware family, which cybercriminals have been known to distribute alongside other unsafe software, such as RedLine and Vidar,

Wwty is capable of encrypting a wide range of file extensions, including .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pdf, .jpg, .jpeg, .png, and .bmp. Wwty is typically spread through corrupted links, spam emails, and software cracks. Once the malware infiltrates a device, it immediately initiates the encryption process.

The Wwty Ransomware Impacts Victims’ Data

The ransom note issued by the attackers outlines their demands, primarily requesting victims to make a specific payment. To initiate the process of recovering their data, victims are directed towards contacting the attackers through the provided email addresses, specifically 'support@freshmail.top' or 'datarestorehelp@airmail.cc.' Upon reaching out, victims will receive further guidance on how to proceed with the ransom payment.

In the ransom note, two different amounts are presented: $980 and $490. Victims are supposedly eligible for the discounted price if they establish contact with the attackers within a designated 72-hour timeframe. It is crucial to note, however, that in most instances, attempting to decrypt files without complying with the ransom demand is highly unlikely to succeed.

Paying the ransom to the attackers is strongly discouraged, as it carries significant risks and provides no guarantee of successfully recovering the encrypted data. Engaging in such transactions can lead to potential financial loss without any assurance of data restoration.

Furthermore, it is imperative for victims to take immediate action to remove the ransomware from their systems. This step is essential to prevent further data loss that may occur due to additional encryption activities carried out by the ransomware.

Make Sure to Protect Your Devices from Malware Threats

Protecting your devices from malware threats involves adopting a holistic approach to digital security. Here's a comprehensive explanation of how users can safeguard their devices without resorting to a mere list:

  • Stay Informed and Educated: Understanding the evolving landscape of malware threats is crucial. Users should stay informed about the latest malware trends, attack vectors and security best practices. Regularly educate yourself about potential risks and how they can affect your devices.
  •  Install Reputable Security Software: Invest in reputable anti-malware software. These programs can scan your device for known malware and provide real-time protection against potential threats. Keep your security software up to date to ensure it can detect the latest threats effectively.
  •  Update Operating Systems and Software: Operating system and software updates often have patches for security vulnerabilities. Ensure your device's OS, applications, and plugins are regularly updated to protect against known vulnerabilities that malware can exploit.
  •  Practice Safe Browsing: Be watchful while browsing the Internet. Avoid suspicious websites, downloads, and email attachments from unknown sources. Verify the legitimacy of websites by checking for HTTPS and using reputable browsers with built-in security features.
  •  Use Strong and Unique Passwords: Malware often tries to collect login credentials. Use strong, unique passwords for your accounts, and think about using a password manager to monitor them securely. Enable multi-factor authentication wherever possible.
  •  Exercise Email Caution: Be skeptical of unsolicited emails, especially those containing attachments or links. Malware often spreads through phishing emails. Verify the sender's authenticity and avoid interacting with doubtful links or downloading files from unknown sources.
  •  Regular Backups: Back up any important data to an external device or a secure cloud service. In case of a malware infection you can recover your data without paying a ransom or losing valuable information.

In summary, protecting your devices from malware threats involves a combination of awareness, proactive measures, and ongoing vigilance. By adopting a comprehensive approach to digital security, you can reduce the possibility of malware infections significantly and safeguard your sensitive data and personal information.

The full text of the ransom note Wwty Ransomware leaves to its victims is:


Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.

To get this software you need write on our e-mail:

Reserve e-mail address to contact us:

Your personal ID:'

Wwty Ransomware Video

Tip: Turn your sound ON and watch the video in Full Screen mode.

1 Comment

Anthony Nzamu Reply

Very true


Most Viewed