2022/1/19 Ransomware Terminator
The .360 suffix ransomware is a new type of virus transmitted by the famous ransomware family, BeijngCrypt.
What is the .360 suffix ransomware?
Like most ransomware, the .360 suffix ransomware prevents access to files by encrypting them, changing the filename, and providing victims with instructions on how to recover their files. This ransomware renames all encrypted files by appending the “.360” extension to the filename after encryption.
Once the .360 suffix ransomware enters the computer in one way or another, it changes the Windows registry, deletes shadow copies, opens/writes/copies system files, generates the factura.exe process that runs in the background, loads various modules, etc. Ultimately, this malware encrypts pictures, documents, databases, videos, and other files.
How does the .360 suffix ransomware spread and infect?
After analyzing the infected ransomware, you can understand and check the following precautions against intrusion one by one.
Third-party free software
Spam emails from unknown senders
By exploiting vulnerabilities in programs installed on the computer or the operating system itself
How to recover .360 suffix ransomware files?
Due to the encryption algorithm, the infected computer servers' files vary, requiring independent detection and analysis of the virus characteristics and encryption situation to determine the most suitable recovery plan.
Considering the time, cost, risk, and other factors required for data recovery, if the data is not very important, it is recommended to directly perform a full disk scan for viruses followed by full disk formatting and system reinstallation. Subsequently, carry out system security protection work. If the infected data is important and indeed necessary, you can directly add our technical WeChat or contact us by phone on the right side of this page for a free virus sample test and to provide a data recovery plan.
How to avoid the .360 ransomware?
First, be very careful when browsing web pages, especially when downloading completely free programs. Avoid opening suspicious email attachments, especially when you are not familiar with the sender of the email.
It is also strongly recommended that you consider your existing security software, and possibly switch to another security solution that can provide better computer protection services.
The .520 suffix ransomware is a new type of spreading virus from the well-known BeijngCrypt ransomware family abroad. It evolved from this year's .dragon ransomware, .file ransomware, and since the outbreak of the virus at the end of September this year, we receive quite a few consultations and requests for help from enterprises with encrypted data every day. What is .520 ransomware? The .520 virus...
The Belgian Ministry of Defense acknowledged that attackers accessed its computer network by exploiting a Log4j vulnerability. The Belgian Ministry of Defense has suffered a cyber attack because malicious actors exploited a vulnerability in Log4j. This attack marks the first time that the defense departments of NATO countries have become victims of these vulnerabilities. A spokesperson for the Belgian Ministry of Defense said: "The Ministry of Defense discovered its computer network was subjected to a cyber attack and quickly took measures to isolate the affected parts. The primary task is to maintain the availability of the defense network."
Portland bar chain company McMenamins suffered a ransomware attack. McMenamins, a hotel and bar chain company in Portland, Oregon, stated that the company was hit by a ransomware attack, which may have compromised the personal information of employees, but customer payment information seems to be unaffected. McMenamins claimed that the ransomware attack was confirmed and stopped on December 12, and the FBI has been notified, and...
Monday to Sunday 8:00-22:00
15203845779
To start a conversation
Copyright©2018- 2024 Zhengzhou Shemo Information Technology Co., Ltd. All rights reserved