• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Fortnite VBucks Ransomware

October 31, 2018Simeon Georgiev

Even gamers are not free from the might of ransomware campaigns. Recently, the popular game Fortnite was exploited by the cybercriminals to deceive users. The ransomware known as Fortnite VBucks Ransomware terrorizes those who have installed and regularly play the trendy game. In the past two years, Fortnite has received a huge following.

In the game, there is an in-game currency called Vbucks that primarily runs it. Fortniters gamers are actively trying for a way to acquire it free of cost. This greed was realized by the hackers who then used the knowledge in their own ransomware. The ransomware incites users to use its software with a promise of free Vbucks. When users fall for this trap, they are faced with a hack. Hence, experts advise to avoid any free Vbucks scheme because the in-game currency is only available in two ways:

  • Spending real money to purchase it.
  • Executing tasks and objectives in the game to earn it.

After enter and corrupting the PC, the ransomware stops access to the desktop. User programs are controlled and shut down including the internet browser and the system software. The background theme of the desktop is modified, which then shows the ransom note, promising ransomware removal.

The note begins with the admission of the hacking attempt and mentions the name of the ransomware. It is explained that the reason behind the lack of access to files is the infection of ransomware. The ransom note dictates that the user files have been locked via the encryption process.

Payment is asked in the form of Russian currency, thus pointing the origins of the ransomware to a Russian hideout. The exact ransom is 500,000 RUB ($7600). A website is also provided in the note for further instructions where after paying the ransom, the victims can get their decryption key for ransomware removal.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post CBC Pays CAD 20,000 in Ransom Next post Leading Law Enforcement Agencies Collaborate to Dismantle GandCrab Ransomware

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.