Home Malware Programs Ransomware ZIPE Ransomware

ZIPE Ransomware

Posted: June 1, 2020

File-encryption Trojans continue to be very popular among cybercriminals, and one of the most popular ransomware families in the past two years has been the STOP Ransomware. Thanks to it, dozens of cybercriminals have been able to launch their own file-locker, and one of the latest inclusions to the long list of malware based on the STOP Ransomware is called the ZIPE Ransomware. Unfortunately, users who fall victim to ZIPE Ransomware's attack will end up unable to access many of their important files. If they wish to have them restored, they will be asked to pay a significant ransom fee to the ZIPE Ransomware authors – something that we would advise you not to do.

Just like other ransomware operators, the crooks behind the ZIPE Ransomware state that they are ready to provide decryption in exchange for a ransom payment of $490 – they wish to receive the money via Bitcoin, and they warn their victims that the ransom fee will be doubled if their requests are not met within 72 hours of the attack. Last but not least, the perpetrators also state their readiness to decrypt 1-2 files for free to prove their credibility – they ask the victim to send these files to helpmanager@mail.ch or restoremanager@firemail.cc.  The full instructions of the attackers can be found in the file titled '_readme.txt.'

The only viable and reliable way to recover from ZIPE Ransomware's attack is to eliminate the threat with the help of an anti-malware application, and then recover the lost files from a backup. However, if a backup copy of your data is not available, then you might be able to recover some of them with the use of specialized data restoration software. We assure you that trying to purchase a decryption tool from ZIPE Ransomware's authors is a bad idea, and you may end up being tricked out of your money.

Related Posts

Loading...