Home Malware Programs Ransomware 'mkgoro@india.com' Ransomware

'mkgoro@india.com' Ransomware

Posted: December 30, 2016

Threat Metric

Ranking: 13,531
Threat Level: 8/10
Infected PCs: 295
First Seen: December 30, 2016
Last Seen: October 16, 2023
OS(es) Affected: Windows

'.hta'-formatted ransom notes seem to be gaining popularity among ransomware authors since one of the latest variants of the Dharma Ransomware also uses a ransom message that is delivered in a file named 'info.hta.' This crypto-threat dubbed the 'mkgoro@india.com' Ransomware by malware researchers since this is the contact e-mail that the cyber crooks provide their victims with. Apart from the different ransom note and contact e-mail address, there aren't any major differences between the 'mkgoro@india.com' Ransomware and other variants of the Dharma Ransomware that we've analyzed in the past months.

When the 'mkgoro@india.com' Ransomware infiltrates a computer, it aims to encrypt as many files as possible and to do this the ransomware's authors have programmed their crypto-threats to identify and lock a long list of file extensions. Some of the files most frequently harmed during ransomware attacks are documents, PDF files, spreadsheets, databases, archives, image files, media files, and backups. However, many crypto-threats, including the 'mkgoro@india.com' Ransomware, also may attempt to cause even more damage by encrypting file extensions associated with popular software suites like Photoshop, AutoCad, etc. While the encryption process is running, the 'mkgoro@india.com' Ransomware also attempts to wipe out all Shadow Volume Copies to further reduce the user's chances of getting their files back.

When the 'mkgoro@india.com' Ransomware's encryption routine is finished, the ransomware creates the 'info.hta' file on the user's desktop and executes it to display the concise ransom message it includes automatically. According to the attacker's statement, victims will only be able to recover their files if they follow the payment instructions and send Bitcoins to the 'mkgoro@india.com' Ransomware's operator. The exact amount of the ransom fee is not mentioned, but the attacker assures users that they'll have to pay less if they contact him earlier. Furthermore, the 'mkgoro@india.com' Ransomware offers the opportunity to decrypt up to 3 files for free but under two conditions – the files must be less than 10MB, and they must not include valuable information.

Despite the 'mkgoro@india.com' Ransomware's promise to restore all files once the payment has been completed, the best thing users can do in this scenario is not to pay the ransom! Paying victims not just motivate cyber crooks to continue with their harmful business, but they also end up funding more threatening and sophisticated ransomware. In addition to this, even if you end up paying the ransom fee, there's nothing to stop the author of the 'mkgoro@india.com' Ransomware from collecting the money and abandoning you and your encrypted files. Victims of the 'mkgoro@india.com' Ransomware can remove the threat with the assistance of a reputable cyber security software suite, and users who wish to protect their computers from such threats also can do so by installing and activating a good security product.

Loading...