This article provides information about a version of PGPSnippet data locker ransomware released in active attack campaigns. The threat encrypts important files and demands a ransom payment. By reaching the end of the article, you will know how to remove it and how to restore encrypted files.
PGPSnippet is known to be a ransomware that encrypts files stored on infected hosts and demands a ransom payment for decryption solution. It appends the specific extension [email protected] to the names of all encrypted files. All [email protected] files remain unusable until their code is returned to its original state. Following encryption, the ransomware displays a ransom note that extorts a ransom payment from victims.
|Short Description||A data locker ransomware that utilizes strond cihper algorithm to encrypt files on stored on the infected computer. Then it demands a ransom for decryption solution.|
|Symptoms||Important files are locked and renamed with [email protected] extension. They remain unusable until a ransom is paid.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool||See If Your System Has Been Affected by PGPSnippet|
PGPSnippet Ransomware – Distribution
ThePGPSnippet ransomware infects computer systems with the help of its payload. It may have landed on your computer after you visited a compromised web page. Such pages are usually set to drop the ransomware payload directly on the devices of all visitors. Their URLs can be spread via various advertising campaigns, posted on social (Read more...)
*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Gergana Ivanova. Read the original post at: https://sensorstechforum.com/pgpsnippet-digiworldhack-tutanota-ransomware-remove/