1. We and our AD Partners use cookies to understand how you use our site, improve your experience and serve you personalized content and advertising. Learn how we use cookies in our cookie policy.By continuing to use this site, you accept these cookies. Learn More.

Ryuk Ransomware 2018 Latest Updates & News

Discussion in 'Windows 10 News' started by Jordan, Sep 2, 2018.

  1. Jordan

    Jordan Administrator Staff Member Administrator

    Messages:
    1,452
    Likes Received:
    2
    Trophy Points:
    38
    Ryuk Ransomware 2018 Lastest Readme files - updated September 2018

    Your network has been penetrated.
    All files on each host in the network have been encrypted with a strong algorithm.
    Backups were either encrypted
    Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover.
    We exclusively have the decryption software for your situation

    More than a year ago, world experts recognized the impossibility of deciphering by any means except the original algorithm decoder. no decryption software is available in the public
    Anti Virus Companies, Researched, IT Specialists, and no other persons cant help you decrypt the data.


    No decryption software is available in the public.
    DO NOT RESET OR SHUTDOWN.
    DO NOT RENAME OR MOVE the encrypted and readme files.
    DO NOT DELETE readme files.

    To confirm our honest intentions.Send 2 different random files and you will get it decrypted, it can be from different computers on your network to be sure one key decrypts everything.
    2 files we unlock for free.

    This may lead to the recovery of certain files.
    To get info (decrypt your files) contact us at

    DavidLeoryTax@ protonmail.com
    or
    DavidLeoryTax@tutanota.com

    BTC wallet:
    12ubZzhjrdDvdyv9NdCox1Zj1FAQ5onwx3

    No system is safe

     
     
  2. Avatar

    Advertisement

  3. Jordan

    Jordan Administrator Staff Member Administrator

    Messages:
    1,452
    Likes Received:
    2
    Trophy Points:
    38
    RyukReadMe.txt can be found on the infected device;

    File extension doesn't seem to change up to now, but files such as excel and word etc have been overwritten with the above text.

    Common File locations:
    Desktop
    Temp Folders
    Users

    1 source file found:

    23f8aa94ffb3c08a62735fe7fee5799880a8f322ce1d55ec49a13a3f85312db2.exe
     
    Last edited: Sep 2, 2018
  4. Avatar

    Advertisement

Share This Page