Home Malware Programs Ransomware Kkll Ransomware

Kkll Ransomware

Posted: June 5, 2020

If you find out that some of your files are impossible to access, and their names have been suddenly changed and now include the '.kkll' extension, then your system has fallen victim to an attack of the Kkll Ransomware. This is a Trojan that specializes in encrypting a wide variety of files and, sadly, recovering from its attack can be a very challenging and nearly impossible task. This is owed to the fact that the Kkll Ransomware project is based on the infamous STOP Ransomware, a file-locker that has been used to create over a hundred different pieces of ransomware. It uses a foolproof file-encryption routine that cannot be cracked.

When the Kkll Ransomware infects a computer, it generates a unique encryption key that will be used to lock the files. The key is encrypted and stored on a remote server controlled by Kkll Ransomware's authors, and it is the vital piece of information that you need to decrypt the locked files. Of course, the authors of the Kkll Ransomware will not part with this information for free, and they demand to be paid a hefty compensation in exchange for their help - $490 that must be transferred via Bitcoin.

This STOP Ransomware Variant Demands $490 from Its Victims

Victims of the Kkll Ransomware will find the file '_readme.txt' on their desktops. It contains a message from the attackers that lists their demands, contact information and other details:

  • Their service is priced at $490, but they threaten to double the amount after 72 hours.
  • They offer to unlock 1-2 files for free.
  • They ask to be contacted by messaging, either helpmanager@mail.ch or restoremanager@firemail.cc.

You should not seek help from the criminals behind the Kkll Ransomware because they may take your money without providing anything in return. The best to do is to run an anti-malware tool to kill the Kkll Ransomware, and then try to restore your data from a backup or use other data recovery methods and utilities.

Loading...