威脅數據庫 Ransomware KUZA 勒索軟體

KUZA 勒索軟體

KUZA 勒索軟體是一種威脅。 KUZA 勒索軟體會將受害者檔案加密,並向其附加「.Ripa」副檔名,有時還會加入網路犯罪分子的電子郵件地址。感染後,KUZA 勒索軟體會向受害者發送名為「#Read-for-recovery.txt」的勒索字條,要求受害者支付解密費用。 KUZA 勒索軟體屬於臭名昭著的Proton 勒索軟體家族。

KUZA 勒索軟體的主要特徵:

  1. 檔案加密: KUZA 對檔案進行加密,並向檔案加上「.Ripa」副檔名以及網路犯罪分子的聯絡電子郵件地址。
  2. 勒索訊息:受害者會收到一條名為「#Read-for-recovery.txt」的勒索訊息,以發起聯繫進行付款和解密。
  3. 聯絡方式:網路犯罪分子提供兩個電子郵件地址用於通訊:amir206amiri2065sa@gmail.com 和 amir206amiri2065sa@tutamail.com。
  4. 感染媒介: KUZA 勒索軟體可以透過詐騙廣告、Torrent 網站或包含巨集的受感染電子郵件附件滲透電腦。

防範 KUZA 勒索軟體:

為了防範 KUZA 和類似勒索軟體威脅:

  • 謹慎使用電子郵件附件:避免開啟可疑附件,尤其是來自未知寄件者的附件。
  • 警惕種子和廣告:不要下載軟體或點擊不可信來源的廣告。
  • 實施安全軟體:安裝信譽良好的反惡意軟體軟體並進行更新,以偵測和防止勒索軟體攻擊。

KUZA 勒索軟體凸顯了對有效網路安全措施的迫切需求,以降低資料遺失和財務損失的風險。

KUZA 勒索軟體的受害者將收到的贖金訊息如下:

'~~~ KUZA ~~~
>>> What happened?
We encrypted and stolen all of your files.
We use AES and ECC algorithms.
Nobody can recover your files without our decryption service.


>>> How to recover?
We are not a politically motivated group and we want nothing more than money.
If you pay, we will provide you with decryption software and destroy the stolen data.


>>> What guarantees?
You can send us an unimportant file less than 1 MG, We decrypt it as guarantee.
If we do not send you the decryption software or delete stolen data, no one will pay us in future so we will keep our promise.


>>> How to contact us?
Our email address: amir206amiri2065sa@gmail.com
In case of no answer within 24 hours, contact to this email: amir206amiri2065sa@tutamail.com
Write your personal ID in the subject of the email.


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>> Your personal ID: - <<<<<
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>


>>> Warnings!
- Do not go to recovery companies, they are just middlemen who will make money off you and cheat you.
They secretly negotiate with us, buy decryption software and will sell it to you many times more expensive or they will simply scam you.
- Do not hesitate for a long time. The faster you pay, the lower the price.
- Do not delete or modify encrypted files, it will lead to problems with decryption of files.'

熱門

最受關注

加載中...