• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

PGPSnippet Ransomware

May 30, 2018Simeon Georgiev

Last week, cyber hunters discovered a dangerous cryptovirological strain called PGPSnippet. The strain developed on very comprehensive and complex encryption algorithm is able to lock down every file on the affected computer. This means ransomware removal activities to get rid of PGPSnippet can be quite time-consuming. Every affected file gets the extension with the email contact of the attackers. It also drops a ransom note on the desktop of the affected device.

PGPSnippet Operators Look Ruthless

By their infiltration and encryption activity, it seems like PGPSnippet operators are not some rooky cybercriminals. There are two reasons why security experts have come to this conclusion.

Demanding Reasonable Amount of Ransom

Small and large ransoms amounts, both can work against attackers. In case of nominal ransom demands, the affected users think that they are only lured to pay and the attackers won’t provide them decryption key in such nominal amount. On the other hand, hefty ransom demands are a non-starter because of the majority of the victims start to look elsewhere for ransomware removal instead of dealing with the attackers.

For that matter, PGPSnippet operators demand a reasonable amount of money for ransomware removal ($500) so that the victims can seriously consider the option of the ransom payment.

Using Deadline Tactfully

They give a 3-day deadline to the victims. Non-compliance with the deadline results in doubling the ransom amount. The 72-hour deadline basically helps in the cases where hesitant victims fail to reach a decision and as the deadline approaches, they pay the attackers to avoid ransom increment.

PGPSnippet Uses Email Attachment

Email attachments are one of the most used tools to deliver cryptovirological payloads. PGPSnippet operators also use obfuscated attachments to infiltrate the device by posing as a representative of some legitimate company. As soon as the user opens the malicious attachment, an executable file ‘SETT’ quickly starts to run on the affected device. Within few minutes, the payload finishes its encryption activity.

According to security experts, it is possible to recover your data with third-party ransomware removal services. So, instead of getting psychologically exploited by the operators, immediately get in touch with IT security professionals after the attack.

 

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Ransomware is Now More Common than Malware Next post Embrace Ransomware: The New Variant of Everbe

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.