This is an article that provides specific details on Everbe 2.0 ransomware infection as well as a step-by-step removal followed by alternative data recovery approaches.
As spotted by security researchers a new version of Everbe ransomware has been released in active attack campaigns. Everbe 2.0 is a threat that corrupts computer systems in order to encode valuable data and demand a ransom for its decryption. This time cyber criminals set the crypto virus to append a specific string of extensions that begins with their contact email and ends with the extension .divine. So upon encryption the files are renamed with .[[email protected]].divine extensions and access to the information they store is restricted. In addition a ransom note !=How_to_decrypt_files=!.txt attempts to blackmail you into paying for a decryption tool possessed by hackers.
|Short Description||A data locker ransomware that utilizes AES cihper algorithm to encrypt valuable files stored on the infected computer and then demands a ransom for decryption solution.|
|Symptoms||The access to important files is restricted and all they are renamed with .[[email protected]].divine string of extensions. A ransom message urges victims to contact hackers at [email protected] email address.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool||See If Your System Has Been Affected by Everbe 2.0|
Everbe 2.0 Ransomware – Distribution
For the distribution of this iteration of (Read more...)
*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | SensorsTechForum.com authored by Gergana Ivanova. Read the original post at: https://sensorstechforum.com/everbe-2-0-ransomware-divine-remove-restore/