Remove Virus (Scarab Ransomware) – Restore Files Virus Virus image ransomware note  .recme extension

The [email protected] Virus virus is a new version of the Scarab ransomware family. It has been detected in an ongoing attack that carries the new versions. Like the previous versions it is capable of inflicting much damage to the victim hosts.

Threat Summary

Name[email protected]
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the .recme extensions and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by [email protected]

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss [email protected]Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

[email protected] Virus Virus – Distribution Ways

The [email protected] virus as a new strain of the Scarab ransomware family uses the same delivery tactics as its previous versions. This indicates that various hackers and groups are heavily utilizing the main source code to create their own versions of the ransomware.

A main delivery tactic is the use of email SPAM messages utilizing various social engineering tactics. The hackers attempt to impersonate well-known companies and services by sending the ransomware files either attached directly or hyperlinked in the body contents. They are also one of the top choices for distributing infected payloads. There are two main types that are the most common:

  • Application Installers — The virus code can be embedded in software installers of popular applications. The hackers typically choose programs that are popular with the common users: (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: