Home Malware Programs Ransomware Acuna Ransomware

Acuna Ransomware

Posted: March 22, 2021

The Acuna Ransomware is a file-encryption Trojan designed to cause damage to the files stored on infected machines and then drop a message extorting the victim for money. This malware is believed to be a member of the Phobos Ransomware family and, unfortunately, this means that it probably uses a flawless file-encryption routine, which cannot be cracked via free tools. The only way to decrypt the files that the Acuna Ransomware damages reliably is run a special decryptor paired with the unique decryption key generated for the victim. This important piece of information is, however, stored on the servers of Acuna Ransomware's operators, and they will not give it away for free.

The Acuna Ransomware may reach your computer thanks to a fake download, bogus email attachment or a corrupted advertisement. Of course, these are not the only online channels use to propagate such malware – the masterminds behind these threatening campaigns may explore dozens of malware propagation channels. The Acuna Ransomware's attack leaves files encrypted and also adds the extension '.id[].[Cusapool@firemail.cc].Acuna' to their original names. On top of this, it drops the ransom message 'info.txt', which contains a ransom message from the perpetrators.

The criminals tell their victims to send them a message at cusapool@firemail.cc, zezoxo@libertymail.net, or togerpo@zohomail.eu, as well as consider contacting them via the Telegram handle @zezoxo. You can rest assured that the ransomware's operators will ask for a ransom payment in exchange for their assistance – you should not consider accepting this offer. Previous victims of the Phobos Ransomware and its variants have already been tricked out of their money.

If the Acuna Ransomware has damaged your files, you should run an anti-virus tool to eliminate the threatening application immediately and then proceed to recover your files from a backup. If you do not have a backup of your data available, then you may want to explore alternative data recovery methods and software.

Related Posts