YYYYBJQOQDU Ransomware

YYYYBJQOQDU Ransomware Description

The YYYYBJQOQDU Ransomware is a file-locking Trojan that stops your documents and other media from opening by encrypting it. Users can verify infections by searching for its extension of 'YYYYBJQOQDU' and the Notepad ransom note. However, rather than paying, victims always should recover from backups or seek a cyber-security specialist's opinion, and quarantine or delete the YYYYBJQOQDU Ransomware with a suitable anti-malware program.

A Ransoming Operation Over Free E-mail Strikes Again

Another file-locking Trojan that's using the Cock.li e-mail host is launching attacks against Chinese residents using, as per the norm, Windows PCs. The YYYYBJQOQDU Ransomware's ransoming infrastructure is similar to that of the 'cryptor55@cock.li' Ransomware or the 'prusa@rape.lol' Ransomware, among other examples, but malware researchers can't verify any relationships. The YYYYBJQOQDU Ransomware may be independent and show limited clues for determining its installing exploits.

The YYYYBJQOQDU Ransomware encrypts the infected PC's files, including not just 'normal' media formats, like documents or images, but also HTML Web pages, for holding them hostage. The only notable change it makes to the names of the affected data is the use of an added extension of 'YYYYBJQOQDU,' which is very traditional behavior for most file-locking Trojans. Users, still, should be capable of identifying the original content easily, since the YYYYBJQOQDU Ransomware doesn't remove the old extensions or the rest of the name.

Besides the file-locking attack, the YYYYBJQOQDU Ransomware's payload includes a ransoming feature that generates a Notepad file in English. However, the text of the note is, for the most part, a copy-and-paste from the Globe Ransomware family – with some additions that contain various grammar issues. It gives no immediate information on the ransoming cost besides telling victims the e-mail addresses for negotiating further over the decryption service that repairs their files.

Malware experts don't encourage paying this ransom but do highlight the 'free sample' offers, which the YYYYBJQOQDU Ransomware shares with various competitors, as potentially helpful.

Suppressing Asian Extortion in Advance

The YYYYBJQOQDU Ransomware isn't the only file-locking Trojan whose campaign is running against Asian victims – the equally-fresh the '.securityP File Extension' Ransomware of the Paradise Ransomware's family is responsible for similar attacks against South Koreans. Any connections that The YYYYBJQOQDU Ransomware might or might not have to reminiscent campaigns require more evidence for the cyber-security industry's analysis, and victims should consider quarantining the YYYYBJQOQDU Ransomware, along with any infection-related files, encrypted media or ransom notes. Decryption for free may be possible for individual file-locking Trojans, although, in general, it's an unlikely solution.

Data repairs are made much more straightforward for victims of file-locking Trojan infections whenever there are backups available on other devices. Preemptive protection can take different forms, as well, such as scanning e-mail attachments before launching them, disabling script-based features that are vulnerable to being exploited, and keeping secure passwords for your network logins. Most anti-malware products should delete the YYYYBJQOQDU Ransomware safely, especially, if they're using the latest versions of their databases.

China isn't a stranger to attacks like the YYYYBJQOQDU Ransomware's file-locking behavior, but the YYYYBJQOQDU Ransomware could roam outside of its borders. A backup is a canny investment for anyone whose files are worth a penny, let alone a Trojan's ransom.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to YYYYBJQOQDU Ransomware may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Posted: March 26, 2019
Home Malware Programs Ransomware YYYYBJQOQDU Ransomware

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.