Threat Database Ransomware '.yum File Extension' Ransomware

'.yum File Extension' Ransomware

By GoldSparrow in Ransomware

The '.yum File Extension' Ransomware is an encryption ransomware Trojan that carries out a typical version of these tactics. Threats like the '.yum File Extension' Ransomware carry out an attack that involves encrypting the victims' files to make them inaccessible, essentially taking them hostage, and then demanding a ransom payment. Computer users that avoid paying any ransom and take preemptive measures can ensure that the '.yum File Extension' Ransomware cannot attack their computers.

Credible PC Users may Be Infected with the '.yum File Extension' Ransomware

The '.yum File Extension' Ransomware is typically delivered to the victim via corrupted spam email attachments, often in the form of social engineering tactics that trick the victim into opening a file with an included macro script that downloads and installs it onto the victim's computer. Once the '.yum File Extension' Ransomware is installed by the corrupted script on the victim's computer, the '.yum File Extension' Ransomware will run in the background and use a strong encryption algorithm to start making the victim's files inaccessible. The '.yum File Extension' Ransomware targets the user-generated files, which may include a wide variety of document types, media files, archives, databases, and numerous other data containers. The '.yum File Extension' Ransomware will try to encrypt the following data in its attacks:

.jpg, .jpeg, .raw, .tif, .gif, .png, .bmp, .3dm, .max, .accdb, .db, .dbf, .mdb, .pdb, .sql, .dwg, .dxf, .cpp, .cs, .h, .php, .asp, .rb, .java, .jar, .class, .py, .js, .aaf, .aep, .aepx, .plb, .prel, .prproj, .aet, .ppj, .psd, .indd, .indl, .indt, .indb, .inx, .idml, .pmd, .xqx, .xqx, .ai, .eps, .ps, .svg, .swf, .fla, .as3, .as, .txt, .doc, .dot, .docx, .docm, .dotx, .dotm, .docb, .rtf, .wpd, .wps, .msg, .pdf, .xls, .xlt, .xlm, .xlsx, .xlsm, .xltx, .xltm, .xlsb, .xla, .xlam, .xll, .xlw, .ppt, .pot, .pps, .pptx, .pptm, .potx, .potm, .ppam, .ppsx, .ppsm, .sldx, .sldm, .wav, .mp3, .aif, .iff, .m3u, .m4u, .mid, .mpa, .wma, .ra, .avi, .mov, .mp4, .3gp, .mpeg, .3g2, .asf, .asx, .flv, .mpg, .wmv, .vob, .m3u8, .dat, .csv, .efx, .sdf, .vcf, .xml, .ses, .qbw, .qbb, .qbm, .qbi, .qbr , .cnt, .des, .v30, .qbo, .ini, .lgb, .qwc, .qbp, .aif, .qba, .tlg, .qbx, .qby , .1pa, .qpd, .txt, .set, .iif, .nd, .rtp, .tlg, .wav, .qsm, .qss, .qst, .fx0, .fx1, .mx0, .fpx, .fxr, .fim, .ptb, .ai, .pfb, .cgn, .vsd, .cdr, .cmx, .cpt, .csl, .cur, .des, .dsf, .ds4, , .drw, .eps, .ps, .prn, .gif, .pcd, .pct, .pcx, .plt, .rif, .svg, .swf, .tga, .tiff, .psp, .ttf, .wpd, .wpg, .wi, .raw, .wmf, .txt, .cal, .cpx, .shw, .clk, .cdx, .cdt, .fpx, .fmv, .img, .gem, .xcf, .pic, .mac, .met, .pp4, .pp5, .ppf, .nap, .pat, .ps, .prn, .sct, .vsd, .wk3, .wk4, .xpm, .zip, .rar.

The '.yum File Extension' Ransomware's Ransom Demand

After the victim's files have been compromised with the encryption algorithm, the '.yum File Extension' Ransomware demands a ransom payment. To do this, the '.yum File Extension' Ransomware drops a ransom note that takes the form of a text file named '!!!READ_IT!!!.txt'. This ransom note demands that the victim contact the criminals via email, to the email addresses recoverymydata@protonmail.com and recoverydata@india.com. The recommended reaction is to avoid following the instructions in the '.yum File Extension' Ransomware ransom note. Apart from the fact that it is very unlikely that the criminals will keep their promise to decrypt the data, paying these ransoms or contacting the criminals via email exposes computer users to additional tactics and malware infections.

Dealing with the '.yum File Extension' Ransomware

The best protection against threats like the '.yum File Extension' Ransomware is to have backup copies of all data. Having backups stored on external memory devices removes the criminals' leverage and any need to pay the '.yum File Extension' Ransomware ransom. It also is imperative to use a security program to intercept the '.yum File Extension' Ransomware before it is installed and manages to compromise any data on the victim's computer.

Trending

Most Viewed

Loading...