Uihj Ransomware
There seems to be at least a couple of new Djvu ransomware clones coming out every week. This week is no exception - the latest ransomware based on Djvu to join the growing family of clones is called the Uihj ransomware.
Uihj would encrypt files on a system, rendering them practically useless. Affected file types include most popular media files, archive and document file types as well as databases. Encrypted files receive the ".uihj" extension after their old one.
The ransom note is dropped inside a text file named "_readme.txt", as is the case with all Djvu clones.
The full ransom note reads as follows:
ATTENTION!
Don't worry, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
hxxps://we.tl/t-WbgTMF1Jmw
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.To get this software you need write on our e-mail:
restorealldata at firemail dot ccReserve e-mail address to contact us:
gorentos at bitmessage dot chOur Telegram account:
@datarestoreYour personal ID: