Threat Database Ransomware Zzz12 Ransomware

Zzz12 Ransomware

By GoldSparrow in Ransomware

The Zzz12 Ransomware is an encryption ransomware Trojan that is used to take the victims' files hostage to extract a ransom payment. The Zzz12 Ransomware uses the AES encryption to make the victim's files inaccessible. The Zzz12 Ransomware then delivers a ransom note demanding that the victim pay a ransom amount to restore the files damaged by the attack. The Zzz12 Ransomware is typically delivered to victims through the use of damaged spam email attachments, which often use social engineering tricks to convince the victims to open a corrupted file attachment and allow it to install the Zzz12 Ransomware onto their PCs.

How the Zzz12 Ransomware Zzz12 Ransomware Attack Work

Once the Zzz12 Ransomware has been installed on the victim's computer, the Zzz12 Ransomware will scan the victim's computer in search for files to encrypt in its attack. The Zzz12 Ransomware will use the AES encryption to make these files inaccessible and then mark the encrypted files by adding the file extension '.zzz12' to it's name. The Zzz12 Ransomware deletes the Shadow Volume Copies and the System Restore points on the affected computer to ensure that the victim's files cannot be restored easily. The Zzz12 Ransomware will target the user-generated files in its attack, which may include a wide variety of media files, images, documents, texts, databases, archives, backups, and many other file types. The files that threats like the Zzz12 Ransomware may target in their attacks include:

.ebd, .jbc, .pst, .ost, .tib, .tbk, .bak, .bac, .abk, .as4, .asd, .ashbak, .backup, .bck, .bdb, .bk1, .bkc, .bkf, .bkp, .boe, .bpa, .bpd, .bup, .cmb, .fbf, .fbw, .fh, .ful, .gho, .ipd, .nb7, .nba, .nbd, .nbf, .nbi, .nbu, .nco, .oeb, .old, .qic, .sn1, .sn2, .sna, .spi, .stg, .uci, .win, .xbk, .iso, .htm, .html, .mht, .p7, .p7c, .pem, .sgn, .sec, .cer, .csr, .djvu, .der, .stl, .crt, .p7b, .pfx, .fb, .fb2, .tif, .tiff, .pdf, .doc, .docx, .docm, .rtf, .xls, .xlsx, .xlsm, .ppt, .pptx, .ppsx, .txt, .cdr, .jpe, .jpg, .jpeg, .png, .bmp, .jiff, .jpf, .ply, .pov, .raw, .cf, .cfn, .tbn, .xcf, .xof, .key, .eml, .tbb, .dwf, .egg, .fc2, .fcz, .fg, .fp3, .pab, .oab, .psd, .psb, .pcx, .dwg, .dws, .dxe, .zip, .zipx, .7z, .rar, .rev, .afp, .bfa, .bpk, .bsk, .enc, .rzk, .rzx, .sef, .shy, .snk, .accdb, .ldf, .accdc, .adp, .dbc, .dbx, .dbf, .dbt, .dxl, .edb, .eql, .mdb, .mxl, .mdf, .sql, .sqlite, .sqlite3, .sqlitedb, .kdb, .kdbx, .1cd, .dt, .erf, .lgp, .md, .epf, .efb, .eis, .efn, .emd, .emr, .end, .eog, .erb, .ebn, .ebb, .prefab, .jif, .wor, .csv, .msg, .msf, .kwm, .pwm, .ai, .eps, .abd, .repx, .oxps, .dot.

The Zzz12 Ransomware delivers its ransom note in a text file named 'Notice.txt,' which is dropped on the infected computer. The Zzz12 Ransomware's ransom note contains a short message that reads as follows:

'Your files was encrypted using AES-256 algorithm. Write me to e-mail: zzz12341@protonmail.com to get your decryption key. You have 5 days'

Dealing with the Zzz12 Ransomware Zzz12 Ransomware Infection

Computer users should not contact the criminals at the provided email address. There is a very small chance that they will help the victims to restore their files after they pay the ransom. Furthermore, paying these ransoms exposes computer users to additional attacks since they will have shown a willingness to pay the ransom. Paying the Zzz12 Ransomware's ransom also allows criminals to continue creating and distributing threats like the Zzz12 Ransomware. Instead of paying the Zzz12 Ransomware Zzz12 Ransomware ransom, malware analysts advise computer users to take steps to ensure that all data is backed up on an external memory device or the cloud properly. File backups are the ultimate protection against threats like the Zzz12 Ransomware because they allow computer users to be sure that their data is safe and restore the data without having to contact the criminals or pay any ransom easily. A security application that is fully up-to-date can be used to remove or intercept the Zzz12 Ransomware.

Trending

Most Viewed

Loading...