‘Decipher@keemail.me’ Ransomware
Posted: July 16, 2015
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 87 |
First Seen: | July 16, 2015 |
---|---|
Last Seen: | January 21, 2022 |
OS(es) Affected: | Windows |
The 'Decipher@keemail.me' Ransomware is a file encryptor Trojan that may make modifications to make files of popular formats (such as images and text documents) unreadable. As with similar threats, these attacks are intended to coerce the victim into transferring money to the 'Decipher@keemail.me' Ransomware's developers in exchange for a decryption key. Anti-malware solutions can be used to block the 'Decipher@keemail.me' Ransomware's original installers and various delivery methods. However, even after deleting the 'Decipher@keemail.me' Ransomware, additional steps are necessary for recovering your file data.
The Ransomware Without Instructions
The 'Decipher@keemail.me' Ransomware is a likely variant of Cryptowall Ransomware or Rakhni, although its campaigns are much newer than those threats and utilize as of yet unconfirmed infection methods. Malware researchers haven't confirmed the source of the 'Decipher@keemail.me' Ransomware installations, but they have noted an apparent absence of e-mail-based attacks. The lack of such attacks could indicate that the 'Decipher@keemail.me' Ransomware is being installed by browser-loaded exploit kits, by freeware bundles or in the payloads of other threats.
The 'Decipher@keemail.me' Ransomware targets files of specific types, including formats such as DOC, JPG, and PDF. These files are encrypted, making them effectively unusable. Additional changes to the file names insert the string ''Decipher@keemail.me'' along with a unique ID number, allowing victims to identify the affected files. Malware analysts also verified the 'Decipher@keemail.me' Ransomware's attacking files on network-shared locations, instead of limiting itself to local files.
Despite these generic tactics, the 'Decipher@keemail.me' Ransomware also shows at least a single, major divergence from standard file encryption campaigns. Unlike most ransomware, current versions of the 'Decipher@keemail.me' Ransomware don't generate text files that instruct their victims on how to make payments. The 'Decipher@keemail.me' Ransomware also fails to lock the OS desktop or make other, highly visible modifications for promoting its ransom recommendations. However, the e-mail addresses provided in the file name modifications most likely are intended to be a means of providing ransom-related communications.
Deciphering a Safe Solution to the 'Decipher@keemail.me' Ransomware
Initiating payments to third parties through the 'Decipher@keemail.me' isn't guaranteed to restore your files. However, many PC security companies can offer specialized decryption tools for major threats, including Cryptowall variants like the 'Decipher@keemail.me' Ransomware. Malware researchers also have found most forms of file encryptors to be ineffective at compromising backups in particularly secure locations, such as cloud storage services.
Updating your security software can give it the optimal chance of detecting and deleting the 'Decipher@keemail.me' Ransomware, along with any threats related to the 'Decipher@keemail.me' Ransomware. Updating your software, in general, particularly exploit-rich platforms like Flash, also is ideal for your PC's security. So far, the 'Decipher@keemail.me' Ransomware campaign, for all its newness, shows all inclinations of utilizing non-consensual software exploits that require neither the victim's consent nor his awareness of the attack.
There is some initial, albeit unconfirmed evidence that some versions of the 'Decipher@keemail.me' Ransomware may be being served via compromised advertising networks, alongside fraudulent warnings for phishing attacks.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.