Home Malware Programs Ransomware Scarab-Ukrain Ransomware

Scarab-Ukrain Ransomware

Posted: July 26, 2018

The Scarab-Ukrain Ransomware is the next member of the Scarab Ransomware family and it once again features no improvements in terms of functionality. The only significant change is that it uses the '.ukrain' extension to mark the locked files, as well as features a different e-mail address in the ransom note that is once again found in the file 'HOW TO RECOVER ENCRYPTED FILES.txt.' The threat is likely to be spread with the use of spoofed e-mail messages, which contain a corrupted attachment. The attackers might use different e-mail addresses to send out the messages, and their names might be very similar to the ones of legitimate banking institutions, companies, and other entities that might be considered to be trustworthy.

When the Scarab-Ukrain Ransomware is launched on a computer, it will begin to work in the background immediately to avoid raising any flags. The victims are likely to lose the majority of their documents, archives, spreadsheets, images, videos, and even some more obscure file types. As we mentioned above, the encrypted files will have the '.ukrain' extension added to their names, therefore making it fairly easy to identify which ones were corrupted files.

The attackers ask to be contacted by messaging either 'cr64@keemail.me' or 'cr64@mail.ee,' but this might not be the best idea since they have provided no evidence that they have a working decryption software. In addition to this, their help will not be offered for free, and you might be asked to pay them a hefty ransom amount in exchange for the empty promise that they will help you out when the money is in their account. The suggestion is to avoid dealing with ransomware authors and use a trustworthy anti-malware utility to get rid of the threat immediately. When this is done, you should try using 3rd-party file restoration software since it might sometimes be able to help out with recovering some of the files damaged by ransomware.

Loading...