AG88G Ransomware

AG88G Ransomware Description

The AG88G Ransomware is a file-locking Trojan that comes from AES-Matrix Ransomware's family. Users should have backups for protecting themselves from its primary feature, the harmful encryption of media files. Anti-malware services can provide secondary means of defense through quarantining or removing the AG88G Ransomware as soon as they detect it.

Revisiting the Matrix of Data Kidnappers

The evolution of technology coincides with the growth and streamlining of criminal businesses taking advantage of these newfound avenues for money and misbehavior. One of the most well-known means by which criminals take advantage of software for harm currently is harmful encryption, and a part of Trojan families as vast as the STOP Ransomware, the kit-brewed Crysis Ransomware, or the less-often-seen AES-Matrix Ransomware. An offshoot of the last of these is carrying the name (and extension) of the AG88G Ransomware into 2020's summer months.

First verifiable through samples in the second week of June, the AG88G Ransomware appears similar to other offspring from the AES-Matrix Ransomware's group, like the BDDY Ransomware, the Kromber Ransomware, the MDRL Ransomware or the NGSC Ransomware. The Windows-only program leverages a secured version of the most common form of encryption, AES, for blocking documents, pictures, spreadsheets, databases, music, and other media on any available drives. Inconveniently for the victims, it also includes a feature for overwriting filenames with Base64-encoded characters, including the extensions.

Users have the opportunity for gambling on buying the threat actor's decryption and file-unlocking solution to this attack, according to the local Web page that the AG88G Ransomware creates, and the contact information that it also embeds into filenames. Malware analysts usually recommend against this course of action unless all other backups options are definitively unavailable. The AES-Matrix Ransomware family doesn't have a free decryption solution for current releases, and PC users always should have non-Restore Point-derived reserves for dependable recoveries.

Disrupting a Business Cycle Based on Taking Data for Granted

The AG88G Ransomware success at selling its ransom-based service hinges on victims who aren't backing their files up to other devices, whether they're cloud servers or detachable USB sticks. Administrators can further protect themselves and their data by making appropriate password choices that eliminate dictionary attack risks and installing patches that remove the vulnerabilities threat actors use in their drive-by-download exploits. Businesses should instruct workers on recognizing e-mail phishing lures, particularly, which can include specific information for tricking victims into clicking and enabling unsafe content like macros.

All PC users should avoid illicit download sources that are rich fodder for circulating Trojans, albeit mostly from other families, like the STOP Ransomware. Key generators, premium software cracks, and 'free' versions of purchasable-only programs are common carriers of file-locking Trojans, either through fake filenames or bundles. Enabling Flash, Java, or JavaScript in one's browser also is a regrettably natural means of leaving oneself at risk for attacks from the campaigns of the AG88G Ransomware and other threats.

An up-to-date anti-malware program should have a well-developed definition for dealing with the AES-Matrix Ransomware members.

The AG88G Ransomware preys on the weakness and poor maintenance habits of Windows users for getting its paydays. Like every other file-locking Trojan family, its intentions are thwartable with ease, as long as everyone backs their work up without putting it off until it's too late.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to AG88G Ransomware may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Posted: June 10, 2020
Home Malware Programs Ransomware AG88G Ransomware

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.