Makop Family Brings Another Menace In the Shape of FIOI Ransomware
Table of Contents
What is FIOI Ransomware?
FIOI Ransomware is a malicious file-encrypting program belonging to the notorious Makop ransomware family. Like its counterparts, FIOI ransomware encrypts user files, appending a unique ".FIOI" extension, followed by random characters and an email address, to each affected file. This extension format not only signals to users that their files are locked, but it also facilitates communication between the attackers and their victims, providing victims with an email address to reach out for decryption instructions.
Upon successful encryption, FIOI ransomware alters the user's desktop wallpaper to a warning message and drops a ransom note named "+README-WARNING+.txt" onto the system. This note informs the victim of the encryption and urges them to make contact through one of the two provided email addresses. FIOI's creators claim they will offer a decryption tool in exchange for a ransom, enticing victims by offering to decrypt two small files for free as proof.
The Demands Behind FIOI’s Ransom Note
FIOI ransomware's ransom note is straightforward in its demands: victims must reach out via email to arrange payment in exchange for file restoration. The attackers emphasize that only they can decrypt the files, and any attempt to use third-party decryption software could lead to permanent data loss. This warning, along with a threat of losing access to their data forever if the ransom is unpaid, is a typical pressure tactic used by ransomware operators to coerce victims into compliance.
The FIOI note's ominous language and apparent willingness to "prove" their decryption abilities often put victims in a difficult position. However, paying the ransom is risky and strongly discouraged by cybersecurity experts, as there's no guarantee the attackers will uphold their end of the bargain. Even if the attackers provide a decryption tool, additional demands may follow, or the ransomware could still linger, posing future risks.
Check out the ransom note below:
::: Greetings :::
Little FAQ:
.1.
Q: Whats Happen?
A: Your files have been encrypted. The file structure was not damaged, we did everything possible so that this could not happen..2.
Q: How to recover files?
A: If you wish to decrypt your files you will need to pay us..3.
Q: What about guarantees?
A: Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will cooperate with us. Its not in our interests.
To check the ability of returning files, you can send to us any 2 files with SIMPLE extensions(jpg,xls,doc, etc... not databases!) and low sizes(max 1 mb), we will decrypt them and send back to you. That is our guarantee..4.
Q: How to contact with you?
A: You can write us to our mailboxes: help24dec@aol.com or help24dec@cyberfear.com.5.
Q: How will the decryption process proceed after payment?
A: After payment we will send to you our scanner-decoder program and detailed instructions for use. With this program you will be able to decrypt all your encrypted files..6.
Q: If I don t want to pay bad people like you?
A: If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause only we have the private key. In practice - time is much more valuable than money.
:::BEWARE:::
DON'T try to change encrypted files by yourself!
If you will try to use any third party software for restoring your data or antivirus solutions - please make a backup for all encrypted files!
Any changes in encrypted files may entail damage of the private key and, as result, the loss all data.
How FIOI Ransomware Operates
Ransomware like FIOI works by infiltrating a target computer or network and encrypting files, leaving them inaccessible without a unique decryption key. The result is a form of data hostage-taking, where attackers withhold access to critical information until they receive payment, often requested in cryptocurrency for anonymity. FIOI, in particular, avoids damaging the file structure, focusing solely on encryption to ensure the files remain intact and recoverable — for a price.
In most cases, recovering encrypted files without paying is impossible, as only the attackers have the necessary decryption tool. However, some victims may explore alternative recovery options, such as using backup files or researching third-party decryption tools that may work in certain cases. Prompt removal of the ransomware from an infected system can prevent it from spreading further and encrypting additional files on connected networks.
The Threat of Ransomware Infections
The broader category of ransomware, encompassing variants like FIOI, has become a dominant form of cybercrime. Once a system is infected, ransomware can paralyze access to essential data and halt daily operations for businesses and individuals alike. Over the years, ransomware families such as Ztax and NK have targeted users across various sectors, illustrating the significant scope and economic damage ransomware attacks can inflict.
Ransomware attacks have evolved into sophisticated campaigns with multifaceted demands. Some variants, including FIOI, have adopted double-extortion tactics, threatening to leak sensitive data if the victim refuses to pay. For any organization, the risk of data leakage, legal repercussions, and loss of customer trust make ransomware an ever-looming threat.
FIOI’s Entry Points: Common Methods of Infection
Ransomware infections usually occur when users unknowingly interact with malicious files or links. FIOI's operators use a range of distribution tactics, including email phishing scams with infected attachments or links, often crafted to appear legitimate. Additionally, they may embed ransomware in pirated software, key generators, or other unauthorized downloads, catching victims off guard when they open these seemingly harmless files.
Beyond emails, FIOI may enter systems through malicious ads, pop-ups, or links on untrustworthy websites. Attackers also exploit software vulnerabilities, spread ransomware through infected USB drives, or even use peer-to-peer networks to broaden their reach. These distribution methods highlight the need for heightened caution when handling unsolicited files, especially from unknown sources.
Protecting Against FIOI and Other Ransomware Threats
Defending against ransomware like FIOI requires proactive security measures. The first line of defense is regular data backups stored on external drives or secure cloud services, ensuring data recovery even if encryption occurs. Furthermore, maintaining updated antivirus and anti-malware software on devices is crucial, as is keeping the operating system and all software versions up to date to close vulnerabilities that attackers may exploit.
Ransomware infections are also preventable through cautious online behavior. Avoid opening attachments or clicking links from unknown or unexpected emails, and remain vigilant when encountering ads or pop-ups on unfamiliar websites. A security-aware approach can help mitigate the risk of exposure to ransomware and other forms of cyberattacks.
Final Thoughts
FIOI ransomware underscores the ongoing evolution of ransomware threats, demonstrating how adaptable and targeted these attacks can be. While the Makop family's influence in the ransomware world continues to grow, understanding the threats posed by variants like FIOI is essential to staying one step ahead. Through a combination of vigilant cybersecurity practices and continuous education, individuals and organizations can reduce the risk of falling victim to FIOI and similar ransomware strains.








