Home Malware Programs Ransomware 'f1220@tuta.io' Ransomware

'f1220@tuta.io' Ransomware

Posted: September 27, 2018

The 'f1220@tuta.io' Ransomware has been identified as a new variant of the infamous Scarab Ransomware family. The latest addition to the long list of file-encryption Trojans based on the Scarab Ransomware’s code is as threatening as all other variants, and its victims are guaranteed to be in a lot of trouble if they do not have a backup copy of their important files.

The propagation methods used to distribute the 'f1220@tuta.io' Ransomware are typical – spam e-mails and attacks on vulnerable remote desktop services. If the attackers manage to deploy the 'f1220@tuta.io' Ransomware’s payload successfully, then the file-locker may begin to encrypt various file types – documents, images, videos, archives, databases, backups, etc. immediately. This is why it is important to create backups that are stored on either an offline device or cloud storage regularly – this simple but effective security measure can negate the consequences of a ransomware attack completely. Unfortunately, the victims who do not have a recent backup may be in a fair bit of trouble if the 'f1220@tuta.io' Ransomware manages to infect their computers.

The file-encryption technique used by this ransomware is impossible to crack so that this means that there is not a free decryptor that can be used to decrypt the files. Apart from encrypting various files, the 'f1220@tuta.io' Ransomware also will modify their names by using base64 encoding to scramble the original file name and then append a unique 7-character extension to the base64 encoded name.

Naturally, the 'f1220@tuta.io' Ransomware also will leave behind a ransom note via the file ‘HOW TO RECOVER ENCRYPTED FILES.TXT.’ The contents of the ransom message are the victim’s unique ID, as well as payment instructions and contact details. The attackers demand to receive the payment via Bitcoin, and they also are willing to unlock up to three files for free to prove their credibility. Last but not least, they have included the addresses f1220@tuta.io and f1220@mail.ee as the ways to get in touch with them.

Although there is not a free decryptor compatible with the 'f1220@tuta.io' Ransomware, we assure you that you should not accept to send any money to the anonymous cybercriminals behind the attack. Even if their demands are met, there is no guarantee that they will keep their promise and help you recover your data. The advice is to get rid of the 'f1220@tuta.io' Ransomware with the use of a trustworthy anti-malware scanner. When the file-locker has been fully eradicated, it is recommended to try and use 3rd-party file recovery software that might be able to get at least some of your files back.

Loading...