List of data types targeted by Yakes ransomware: This method will work 100% Encrypted files LOG: C:\Users\User Name\Documents\victim’s id.log IF YOU WANT TO GET ALL YOUR FILES BACK, PLEASE EMAIL ME OR OR (don’t forget to check your spam/junk folder) If you want to remain anonymous or if you aren’t getting a reply, please try using bit message () and use this address to contact me: BM-NAxZ29ouecw2Y7ibaXKus1vxDRDfheW6. Here's a text of an updated ransom demanding message: Some newer variants of this ransomware present it's ransom demanding message in INSTRUCTIONS-README.txt file: WARNING!!!!! Don't delete this file: 427047.txt Just remember that Bitmessage is slow, it takes 5 minutes to send a message and 15 to get a reply. Run it, click New Identity and then send me a message at BM-NBvzKEY8raDBKb9Gp1xZMRQpeU5svwg2 Email me or you don't get a reply or if both emails die, then contact me using a guaranteed, foolproof Bitmessage:ĭownload it form here hxxps:///mailchuck/PyBitmessage/releases/download/v0.5.8/Bitmessage-0.5.8.exe I will give you a decrypter if you pay me. Ransom demand message (presented on a wallpaper and in a -INFECTION.TXT file): Be aware that paying the ransom does not guarantee that your files will ever be decrypted, and so you should never attempt to contact cyber criminals or pay any ransoms. In addition, keep your installed software up-to-date and use a legitimate anti-spyware/anti-virus suite. Therefore, you should be very cautious when downloading attachments sent from unrecognized e-mail addresses and files from third party sources. Note that most ransomware is distributed using peer-to-peer (P2P) networks, malicious e-mail attachments, trojans, and/or fake software updates. The main differences between them is the size of ransom and type of algorithm used for encryption. These viruses also stealthily infiltrate systems and then encrypt various user/system files. There are many other ransomware-type viruses also sharing similarities with Yakes including, for example, Locky, TrueCrypt, and Crypt0L0cker. Known email addresses of cyber criminals behind Yakes ransomware: and of a message (wallpaper) encouraging users to contact the developers of Yakes ransomware to decrypt their compromised data: Therefore, the only and best solution to this problem is to restore files/system from a backup. Unfortunately, there are no tools capable of restoring compromised files at present. This is a rather large ransom as compared to other viruses, since the price usually fluctuates between 0.5 and 1.5 BTC. Research shows that the developers of Yakes demand 4 Bitcoins (currently, equivalent to $1795.56). After contacting cyber criminals, victims supposedly receive all payment instructions. Victims are encouraged to be patient when using Bitmessage, since it is slow when sending and receiving messages. This text file contains a message stating that the files are encrypted, and to restore them, victims must contact cyber criminals via an e-mail address provided or an ID, which is used via Bitmessage. Yakes creates OPEN.ME1 or -INFECTION.TXT file (for example, 4-28-2016-INFECTION.TXT) in each folder containing encrypted files. Following encryption, a message is displayed making a ransom demand. Therefore, it is often difficult to determine which files are encrypted. KEYZ extension, however, others make no changes. Some variants of this ransomware extend the names of encrypted files with the Lokmann.Key993. After infiltrating the system, Yakes encrypts various types of files (for example. Yakes (Mobef) is ransomware-type malware similar to Salam!.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |