Remove Casseto Virus – Restore .cassetto Files

Cassetto Virus image ransomware note .cassetto  extension

The Casseto virus is a new ransomware threat that encrypts target user data with a strong cipher called and renames them with the .cassetto extension. At the moment the acquired samples indicate that this may be a test release. Our article shows how active infections can be removed and the affected files restored.

Threat Summary

NameCasseto virus
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the .cassetto extension and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Casseto virus

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Casseto virus.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Cassetto Virus – Distribution Ways

The Casseto virus is a ransomware strain that has been spotted in a limited distribution release. The acquired samples do not seem to target specific countries and due to the low number of captured virus code the security analysts were not able to state the which delivery method is the preferred one. We anticipate that in future attacks several methods may be used at once. In the meantime any one of the popular tactics can deliver a Casseto virus infection.

The first and most prominent way is to coordinate the construction of an email SPAM campaign. They use various social engineering tactics to coerce the users into interacting with the malicious content. The virus file itself can (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Martin Beltov. Read the original post at: