They are encouraged to do so immediately, since, once 60 hours after encryption has passed, the cost of decryption software and key will increase by 10% per day. The "decryption.txt" text file states that victims must contact cyber criminals via the (or email address and provide the appointed ID. It also stores ransom messages in the form of text files (named " decryption.txt") in all folders that contain encrypted files. redrum" extension.įor example, " 1.jpg" might be changed to " 1." or similar (updated variants append ". RedRum encrypts files, rendering them inaccessible unless victims recover them with decryption software and keys that can purchased from the cyber criminals who designed this ransomware. RedRum renames all encrypted files by adding the victim's ID and email address to their filenames and appending the ".
0 Comments
Leave a Reply. |