This article provides information about a ransomware named after the extension it uses to mark encrypted files [email protected]_com. At the end of it, you will find a step-by-step guide that helps for the removal of this threat as well as alternative data recovery approaches.
The [email protected]_com is a newly detected data locker ransomware that appends an extension of the same name to all files it corrupts. Another name that security researchers use to indicate this ransomware is PGPSnippet. As a typical crypto virus, [email protected]_com blackmails victims into paying a ransom for their encrypted files. According to the ransom message associated with the threat, the ransom amount equals to $500 and hackers demand it in Bitcoin. Keep reading and find out how to remove all malicious files and restore encrypted data.
|Name||[email protected]_com Files Virus|
|Short Description||The [email protected]_com encrypts important files stored on the infected host and then demands a ransom for a decryption solution.|
|Symptoms||Valuable data becomes unopenable and is marked with the extension [email protected]_com. A ransom message demands a ransom payment of $500 in BTC.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool||See If Your System Has Been Affected by [email protected]_com Files Virus|
[email protected]_com Crypto Virus – Distribution
The ransomware payload may land on the computer after a visit of a compromised web page as it can be set to (Read more...)
*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Gergana Ivanova. Read the original post at: https://sensorstechforum.com/decodeme666-tutanota-ransomware-remove-restore/