This article provides information about a recently found iteration of Yyto ransomware as well as a step-by-step guide that provides removal and data recovery help.
As found by security researchers a new iteration of Yyto ransomware has been released in active attack campaigns. Alike its predecessor this strain of the threat aims to encode valuable data stored on compromised computers’ drives. Contrary to the first Yyto which was detected in May 2017 this new strain uses a contact email as a first distinctive extension instead of the name of the ransom note. So all corrupted files receive the extensions [email protected] at the end of their names. They remain inaccessible due to their completely transformed original code. Hackers demand a ransom payment for the unique decryption key that is supposedly able to decrypt data.
|Short Description||A data locker ransomware that utilizes strond cihper algorithm to encrypt valuable files on stored on the infected computer. Threat actors demand a ransom for a decryption solution.|
|Symptoms||Important files are locked and renamed with [email protected] extensions. A ransom note forces victims to pay a ransom for a file decryption tool.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool||See If Your System Has Been Affected by Yyto|
Yyto Ransomware – Distribution
Yyto ransomware infection is triggered by an executable file which hackers distribute with the help of various methods. The main one is believed to be (Read more...)
*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | SensorsTechForum.com authored by Gergana Ivanova. Read the original post at: https://sensorstechforum.com/yyto-mkmk-ransomware-remove-restore/