【家族名】
Win32/Ransom.N3ww4v3
[平台] / [主类型] . [家族名]
平台类型 : Win32 Win64
威胁类型 : Ransom
【是否支持解密】
360解密大师:暂不支持
在线解密:暂不支持
【被加密文件】
被加密文件后缀格式: 修改文件后缀为n3ww4v3
【勒索提示信息】:
文件名:How-to-decrypt.txt
文件内容 :
-------------------------------------------------------------------------------
Hello.
Your files, documents, databases and all the rest aren't REMOVED.
They are ciphered by the most reliable enciphering.
It is impossible to restore files without our help.
You will try to restore files independent you will lose files
FOREVER.
----------------------------------------------------------
You will be able to restore files so:
1. to contact us by e-mail: itsupport831@reddithub.com
Your decrypt ID is: N37WBF-SAr87g5Xp_PHewAhXjm6poGiovWFULa8j8hM*n3ww4v3
* report your ID and we will switch off any removal of files
(if don't report your ID identifier, then each 24 hours will be
to be removed on 24 files. If report to ID-we will switch off it)
* you send your ID identifier and 2 files, up to 2 MB in size everyone.
We decipher them, as proof of a possibility of interpretation.
also you receive the instruction where and how many it is necessary to pay.
2. you pay and confirm payment.
3. after payment you receive the DECODER program. which you restore ALL YOUR FILES.
----------------------------------------------------------
We downloaded your databases, data of your employees, your customers, etc.
If you and I do not agree, your data will be made public!
We'll give access to other hackers.
We will publicize the media. So attention is provided to you.
But I think we'll make a deal.
-------------------------------------------------------------------------------
【防护建议】
1.多台机器,不要使用相同的账号和口令
2.登录口令要有足够的长度和复杂性,并定期更换登录口令
3.重要资料的共享文件夹应设置访问权限控制,并进行定期备份
4.定期检测系统和软件中的安全漏洞,及时打上补丁。
5.定期到服务器检查是否存在异常。查看范围包括:
a)是否有新增账户
b) Guest是否被启用
c) Windows系统日志是否存在异常
d)杀毒软件是否存在异常拦截情况
6.安装安全防护软件,并确保其正常运行。
7.从正规渠道下载安装软件。
8.对不熟悉的软件,如果已经被杀毒软件拦截查杀,不要添加信任继续运行。
|
|
|
|
评论
直达楼层