Home Malware Programs Ransomware 'admin@dontfuckme.top' Ransomware

'admin@dontfuckme.top' Ransomware

Posted: February 7, 2019

The 'admin@dontfuckme.top' Ransomware is a file-locking Trojan that blocks your work and recreational media with encryption that may or may not be breakable. Infections create other symptoms besides non-opening files, such as giving the victim text messages with a ransom demand and adding different extensions onto the locked content's names. All Windows users should have anti-malware tools ready for making removing the 'admin@dontfuckme.top' Ransomware as comprehensive as possible, as well as keep backups for recovering any files.

A Payday for Crime is Returning

The Payday Ransomware of years ago is getting a modern update to suit the 2019's competitive landscape against free options like Hidden Tear, and premium RaaS models like the Scarab Ransomware and the Globe Ransomware. The new version, the 'admin@dontfuckme.top' Ransomware, contains a substantial backend infrastructure that its admins are tailoring for different countries around the world. Like its domains, the 'admin@dontfuckme.top' Ransomware should be compatible with Windows victims on a global scale, whom it attacks with file-encrypting technology.

Readers should take note that the 'admin@dontfuckme.top' Ransomware is not a derivative of the BTCWare-PayDay Ransomware, which hosts a wholly different ransoming message, file-renaming format, and other changes. Besides the 'brand name' similarity and a shared preference for encrypting data, malware experts find no ties between the two threats. However, in either case, along with the 'admin@dontfuckme.top' Ransomware's real ancestor of the Payday Ransomware, users' files are put in danger by a non-consensual encryption routine that could block their media permanently.

The 'admin@dontfuckme.top' Ransomware adds semi-random strings of six letters as new extensions for these files, which it holds hostage while it asks for a Bitcoin ransom. The 'admin@dontfuckme.top' Ransomware doesn't name the price, and malware experts have yet to determine whether or not the 'admin@dontfuckme.top' Ransomware comes with new vulnerabilities that could facilitate unlocking any files for free. However, the original Payday Ransomware is not decryptable with free tools.

Canceling a File-Seizing Criminal's Pay

The 'admin@dontfuckme.top' Ransomware's live campaign employs a variety of websites that the Russian threat actor is registering via temporary, expiring e-mail accounts. These sites include content suggestive of different divisions of these attacks for different nations, including the United States and various parts of Europe. Malware experts have no data concerning the installation exploits, and Windows users should be proactive about standard precautions like avoiding e-mail attachments, disabling browser scripts, and using non-brute-forcible logins.

Save your backups to other devices for a reliable form of self-defense against file-locker Trojans, whose ciphers aren't always decryptable. Some users, additionally, may have luck restoring their work through the Windows' Restore Points, but this solution is an unreliable option for many of the most prominent families of file-locker Trojans in 2019. Most reputable brands of anti-malware software should delete the 'admin@dontfuckme.top' Ransomware proactively or remove an already-existing installation.

The 'admin@dontfuckme.top' Ransomware is aiming for the world at large, but backups are the universal solution to data-sabotaging problems. Anyone with Windows should know the value of keeping more than one copy of their files as long as that work has any monetary or sentimental value.

Loading...