【家族名】
Win32/Ransom.Checkmate
[平台] / [主类型] . [家族名]
平台类型 : Win32 Win64
威胁类型 : Ransom
【是否支持解密】
360解密大师:暂不支持
在线解密:暂不支持
【被加密文件】
被加密文件后缀格式: 修改文件后缀为.checkmate
【勒索提示信息】:
文件名:!CHECKMATE_DECRYPTION_README
文件内容 :
-------------------------------------------------------------------------------
You was hacked by -=CHECKMATE=- team.
All your data has been encrypted, backups have been deleted.
Your unique ID: B2D6D09D852D486699B3CDD5A44CDC40
You can restore the data by paying us money.
We determine the amount of the ransom from the number of encrypted office files.
The cost of decryption is 300 USD for all your files.
Payment is made to a unique bitcoin wallet.
Before paying, you will be able to make sure that we can actually decrypt your files.
For this:
1) Download and install Telegram Messenger https://telegram.org/
2) Find us https://t.me/checkmate_team
Be careful! Telegram has a lot of fake accounts, for example, checkmate_teamm or checkmate_teams.
Dont search manually, use the link above.
If you dont follow this advice, you will lose money and files.
3) Send a message with your unique ID, your e-mail and 3 files for test decryption. Files should be no more than 15mb each.
4) In response, we will send the decrypted files and a bitcoin wallet for payment. Bitcoin wallet is unique for you, so we can find out what you paid.
5) After the payment is received, we will send you the key and the decryption program.
As a bonus, we will let you know how you were hacked.
FAQ:
What is Bitcoin?
read bitcoin.org
Where to buy bitcoins?
https://bitcoin.org/en/buy
https://buy.moonpay.io
or use google.com
Where is the guarantee that I will receive my files back?
The very fact that we can decrypt your random files is a guarantee. It makes no sense for us to deceive you.
How quickly will I receive the key and decryption program after payment?
As a rule, within a few hours, but very rarely there may be a delay of 1-2 days.
How does the decryption program work?
It is simple. You need to copy the key and select a folder to decrypt. The program will automatically decrypt all encrypted files in this folder and its subfolders.
-------------------------------------------------------------------------------
【防护建议】
1.多台机器,不要使用相同的账号和口令
2.登录口令要有足够的长度和复杂性,并定期更换登录口令
3.重要资料的共享文件夹应设置访问权限控制,并进行定期备份
4.定期检测系统和软件中的安全漏洞,及时打上补丁。
5.定期到服务器检查是否存在异常。查看范围包括:
a)是否有新增账户
b) Guest是否被启用
c) Windows系统日志是否存在异常
d)杀毒软件是否存在异常拦截情况
6.安装安全防护软件,并确保其正常运行。
7.从正规渠道下载安装软件。
8.对不熟悉的软件,如果已经被杀毒软件拦截查杀,不要添加信任继续运行。
|
|
|
|
评论
直达楼层