• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • News
  • Tutorials
  • Ransomware TV

What Is Pedcont Ransomware And How Can It Affect You?

June 30, 2018Simeon Georgiev

A mysterious ransomware has been lurking in the security space known as Pedcont Ransomware. So what is Pedcont and how is it different from the existing ransomware viruses?

What is Pedcont Ransomware?

Malware experts found Pedcont during a case of ransomware removal. It silently enters into a computer system and takes control of it. It then proceeds to announce its arrival through a message. The message contains text that all the data has been transferred to a remote location from the hard disk. The data can only be recovered by paying a ransom in the form of Bitcoin equivalent to $50.

After paying the ransom, the data will be removed from the remote location. The message further continues with the threat that in case of non-compliance within three days; the data will be passed over to third parties. Users who have any shady data are blackmailed over turning their data to security agencies.

How is it Different?

Other ransomwares lock and encrypt files using cryptographic algorithms like Advanced Encryption Standard. The password required to decrypt these files and remove ransomware is sent to remote location of the attackers who ask for ransom ranging between $200 to $2000 and sometimes even more depending upon the type of data that have gained access to.

Pedcont Ransomware has displayed different characteristics in comparison to traditional ransomwares. This ransomware is distinct because it gives you a black screen, rendering you unable to use your computer. Moreover, it demands lesser money.

How Does It Hunt?

According to ransomware removal experts, Pedcont Ransomware can enter in your computer through a variety of openings.

  • Users are often targeted with spam emails that they download with email attachments. These mails can contain text documents like Powerpoint or Javascript scripts that consist of Pedcont.
  • File sharing in Peer to Peer networks where Pedcont developers infiltrate the files in the network with their ransomware. Torrent is usually used mostly in this case due to its wide usage.
Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: simeon10georgiev@gmail.com
Previous post Scare Techniques of Cybercriminals in Ransomware Removal Next post Anti-Ransomware Tool for Vehicles Will be Available Very Soon

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • Microsoft Windows flaws exploited by hackers for ransomware attacks
  • Emotet botnet reawakens and is infecting devices worldwide
  • Ways to Catch Cybercriminals
  • What Expertise is Required to Deal with Ransomware Removal?
  • Tips to Prevent Ransomware Attacks on Your Device

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.