Raasv2 Ransomware Demands Bitcoin Ransom

ransomware

Our team recently came across Raasv2, a type of ransomware, during our analysis of new file samples. Upon examining it, we discovered that Raasv2 operates by encrypting files, changing their names, and generating a ransom note called "#FILES-ENCRYPTED.txt". In this note, the ransomware adds the email address decryption.helper@aol.com and the victim's ID at the beginning, while appending the ".raasv2" extension to the original filenames.

To illustrate, if a file named "1.jpg" were affected, Raasv2 would rename it as "[decryption.helper@aol.com][9ECFA84E]1.jpg.raasv2". Similarly, "2.png" would become "[decryption.helper@aol.com][9ECFA84E]2.png.raasv2", and so on. The note instructs the victim to contact decryption.helper@aol.com via email for assistance with the decryption process. If there is no response within 24 hours, an alternative email address, helper@cyberfear.com, is provided. It is crucial to note that the ransom note warns against deleting a specific file called "xor.-.raasv2" as it would result in permanent data loss.

The attackers behind Raasv2 offer a solution to the encryption problem but demand payment to restore the files. They claim that the ransom amount will be determined based on the economic conditions of the victim's country and assure the victim that they are willing to reach an agreement, regardless of the amount. Bitcoin is specified as the preferred payment method.

The ransom note emphasizes the importance of contacting the attackers as soon as possible, as the malware will begin deleting files after a certain period of time. It strongly advises against making any modifications to the encrypted files, as doing so may lead to permanent data loss.

Raasv2 Ransom Note Asks for Bitcoin Payment

The complete text of the Raasv2 ransom note reads as follows:

!!!All of your files are encrypted!!!
To decrypt them send e-mail to this address: decryption.helper@aol.com
In case of no answer in 24h, send e-mail to this address: helper@cyberfear.com
Your System ID : -
!!!Deleting "xor.-.raasv2" causes permanent data loss.

Pay attention

Your system security is very poor, All your files and information are locked.
This is an error on your part We can solve your problem.
But you have to pay us to restore the files.

We set the price according to the economic conditions of your country

Do not worry about the amount, we can agree in any case.
Email us to reach an agreement.

The later you send us an email, the more money we will receive

Hurry up if you want unlock files, because the malware will start deleting the files after a while.
Please do not edit the files, you may lose them forever.

Pay attention

If files are really important for you.

Send us an email soon.

$$We consider the economic and financial situation of you and your country and then say the amount$$

Do not worry, we can reach definitely agree with you.
The payment method is bitcoin.
If you do not trust us we can prove that we can restore the files To do this, send us a file of less than five megabytes Until we restore it Until you trust us.

+read carefully:

Do not edit files You may lose them forever.

Do not worry about the amount, we can reach an agreement.

The payment method is bitcoin.

Send us 3 files if you want to make sure we can restore your files.

+Ways to contact us:

Our Email:
decryption.helper@aol.com
helper@cyberfear.com

Your System ID: -

How Can You Protect Your Data from Ransomware Attacks?

Protecting your data from ransomware attacks requires a proactive approach and adherence to robust security practices. Here are some key measures you can take to enhance your data protection against ransomware:

  • Backup your data: Regularly backup your important data to an offline or cloud storage solution. Ensure that your backups are isolated from your primary system and network to prevent ransomware from infecting them. Regularly test your backups to verify their integrity and restoration process.
  • Keep your software up to date: Regularly update your operating system, software, and applications with the latest security patches. Software updates often include vulnerability fixes that can help protect against ransomware exploits.
  • Use reputable security software: Install and maintain reputable antivirus and anti-malware software on your systems. Keep them updated to ensure they can detect and block ransomware threats effectively.
  • Exercise caution with email attachments and links: Be wary of unsolicited emails and avoid opening attachments or clicking on links from unfamiliar or suspicious sources. Enable spam filters and use email scanning features to identify potential threats.
  • Enable macro and script-blocking: Configure your email client and productivity software to disable macros and scripts by default. This helps prevent ransomware from exploiting these features to execute malicious code.
  • Be cautious of downloads: Download software and files from reputable sources only. Avoid downloading from untrusted websites, peer-to-peer networks, or unofficial sources, as they may contain infected files.
  • Use strong and unique passwords: Create strong passwords for all your accounts, including your operating system, applications, and online services. Use a password manager to securely store and manage your passwords. Enable multi-factor authentication whenever possible.
July 19, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.