• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

GMPF Ransomware

November 6, 2018Simeon Georgiev

A new enemy has made waves in the cyber domain. The threat has been classified as a ransomware known as GMPF Ransomware. Like traditional ransomware, it hacks computers and demands money for ransomware removal. The ransomware was noticed during October 2018 and utilizes both the RSA and AES cryptographic algorithms for encryption of data. Some experts believe it to be a part of the notorious Matrix Ransomware family, which is known for attacking quite a few businesses in 2016.

GMPF ransomware appends “.GMPF” extension to the locked files, which in turn makes them inaccessible. As the basic objective of the ransomware is to blackmail users and extort money from them for ransomware removal, it places a ransom note after succeeding in its operation. There can be a single note or multiple ransom notes. The number depends upon the number of locked files, and each folder of the locked resource gets its own note. The file format of the note varies— sometimes it is RTF and sometimes it is a simple .txt document.

Like his alleged predecessors, the ransomware is being created to make use of extremely sophisticated and powerful cryptographic algorithms, RSA-2048 and AES-128. When the encryption and other activities are run by the ransomware, its own code modifies continuously where the two algorithms act as the last blow to the integrity of the files of the user’s PC files. As a result, these files become inaccessible.

In order to successfully access these files and engage in ransomware removal, a decryption key is needed. When the encryption algorithms work, they send the decryption key to the command-and-control center of the ransomware owners. These keys are promised by the cybercriminals for a clean and quick ransomware removal process in return for money. However, experts discourage trusting cybercriminals because a payment may backfire in the future.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Muscatine Officials Reverting to the Old Ways Next post ESC Corporate Services Attacked by a Ransomware

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.