Tghz Ransomware is a Variant Based on Djvu Code

ransomware

If you find yourself unable to access your files, including images, documents, and other file types, and notice that they now have a ".tghz" extension, it indicates that your computer has been infected with the STOP/DJVU ransomware.

This particular ransomware operates by encrypting personal documents found on the victim's computer and appending the ".tghz" extension to them. Subsequently, a message is displayed, offering to decrypt the data upon payment in Bitcoin. Detailed instructions regarding the payment process can be found in the "_readme.txt" file, which appears on the victim's desktop.

TGHZ is categorized as a file-encrypting ransomware infection that imposes restrictions on accessing data, such as documents, images, and videos. It achieves this by encrypting files and modifying their extensions to ".tghz". In an attempt to extort money, the ransomware demands a ransom payment in the form of Bitcoin cryptocurrency in exchange for restoring access to the data.

Upon initial infection with the TGHZ ransomware, it scans the victim's computer for specific file types, including images, videos, and vital productivity documents such as .doc, .docx, .xls, and .pdf. Once identified, the ransomware proceeds to encrypt these files, changing their extension to ".tghz", effectively preventing them from being opened.

After encrypting the files on the computer, the TGHZ ransomware presents the victim with the " _readme.txt" file, which contains the ransom note and provides instructions on how to contact the ransomware authors. Victims are instructed to reach out to these malicious individuals through the support@fishmail.top and datarestorehelp@airmail.cc email addresses.

Tghz Ransom Note Asks for $490 in Payment

The complete text of the Tghz ransom note goes as follows:

ATTENTION!

Don’t worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
hxxps://we.tl/t-oTIha7SI4s
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that’s price for you is $490.
Please note that you’ll never restore your data without payment.
Check your e-mail “Spam” or “Junk” folder if you don’t get answer more than 6 hours.

To get this software you need write on our e-mail:
support@fishmail.top

Reserve e-mail address to contact us:
datarestorehelp@airmail.cc

How Can You Protect Your System from Ransomware Like Tghz?

Protecting your system from ransomware like TGHZ is essential to prevent data loss and potential financial damage. Here are some effective measures you can take to safeguard your system:

  • Keep your software up to date: Regularly update your operating system, software applications, and plugins. Software updates often include security patches that address vulnerabilities exploited by ransomware.
  • Use robust antivirus and antimalware software: Install reputable security software that provides real-time protection against malware, including ransomware. Keep the software updated and perform regular scans to detect and remove any malicious threats.
  • Exercise caution with email attachments and links: Be cautious when opening email attachments, especially from unknown senders or suspicious emails. Avoid clicking on links in emails that appear suspicious or unexpected. Enable spam filters to help block phishing emails.
  • Be mindful of downloads and websites: Download files only from trusted sources. Exercise caution when visiting websites, especially those with a questionable reputation or that host pirated content. Utilize browser extensions or security tools that can warn you about potentially malicious websites.
  • Enable strong firewall and intrusion detection systems: Maintain an active firewall and intrusion detection system to help block unauthorized access to your network and alert you of potential threats.
  • Regularly back up your data: Implement a robust backup strategy to create copies of your important files and store them securely. Ensure backups are performed regularly and stored offline or in a secure cloud environment. This way, if you fall victim to ransomware, you can restore your data without paying the ransom.
  • Enable file extensions visibility: Configure your system to display file extensions. This allows you to easily identify suspicious file types and avoid opening potentially harmful files.
  • Use strong, unique passwords: Create strong, complex passwords for your accounts and change them regularly. Avoid using the same password for multiple accounts. Consider using a password manager to securely store and generate passwords.
June 26, 2023
Loading...

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.