Scarab-Osk Virus (Scarab Ransomware) – Remove and Restore .osk Files

Scarab-Osk virus image ransomware note .osk extension

The Scarab-osk virus is the newest descendant from the Scarab ransomware family. It follows the already established behavior tactics of the previous versions and renames the target data with the .osk extension. Its development shows that the computer hackers continue to base new threats using the base ransomware code and further modifications to it are expected.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the .osk extensions and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Scarab-Osk

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Scarab-Osk.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Scarab-Osk Virus – Distribution Ways

The newest release of the Scarab ransomware family has been released as the Scarab-osk virus version. At the moment the initial distribution campaign seems to be directed primarily against English speaking users. This shows that the attack waves are targeted and carefully planned before engagement. We expect to see numerous other campaigns carrying the same payload with various techniques.

One of the proposed mechanisms is the use of email SPAM messages that use various social engineering techniques in order to manipulate as many users as possible. The operators can use various text and graphics from well-known sites and services and use them as bait for computer users. The sent messages are disguised as legitimate messages and distribute (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: