What is the Zendaya Ransomware?

ransomware

Zendaya is a malicious program that belongs to the VoidCrypt ransomware family. It was discovered by our researchers while inspecting new submissions to VirusTotal.

How does the Zendaya ransomware affect files?

It encrypts files and changes their filenames with a unique ID, the cyber criminals' email address, and a ".Zendaya" extension. For example, a file named "1.jpg" would appear as "1.jpg.(MJ-VY3946857120)(Decryption.helper@aol.com).Zendaya".

After completing the encryption process, Zendaya created two identical ransom notes – "Decryption-Guide.HTA" and "Decryption-Guide.txt". These messages inform victims that their files have been locked and they must contact and pay the attackers in order to restore them. Victims are also warned that any attempts to rename/modify encrypted files, use third-party recovery tools, or reinstall the operating system will result in permanent data loss.

The Zendaya ransomware is particularly dangerous because of its ability to encrypt files quickly and efficiently without any warning or indication of what is happening until it is too late for victims to do anything about it . It is important for users to be aware of this threat and take the necessary precautions to protect their data.

What does the Zendaya ransomware note look like?

The full text included in the ransom note of the Zendaya ransomware reads as follows:

Your Files Are Has Been Locked

Your Files Has Been Encrypted with cryptography Algorithm

If You Need Your Files And They are Important to You, Dont be shy Send Me an Email

Send Test File + The Key File on Your System (File Exist in C:/ProgramData example : RSAKEY-SE-24r6t523 pr RSAKEY.KEY) to Make Sure Your Files Can be Restored

Make an Agreement on Price with me and Pay

Get Decryption Tool + RSA Key AND Instruction For Decryption Process

Attention:

1- Do Not Rename or Modify The Files (You May loose That file)

2- Do Not Try To Use 3rd Party Apps or Recovery Tools ( if You want to do that make an copy from Files and try on them and Waste Your time )

3-Do not Reinstall Operation System(Windows) You may loose the key File and Loose Your Files

4-Do Not Always Trust to Middle mans and negotiators (some of them are good but some of them agree on 4000usd for example and Asked 10000usd From Client) this Was happened

Your Case ID :-

OUR Email :Decryption.helper@aol.com

in Case of no answer: Decryption.help@cyberfear.com

How to keep your system safe from threats like the Zendaya ransomware?

The best way to keep your system safe from threats like the Zendaya ransomware is to practice good cyber hygiene. This includes regularly updating your operating system and applications, using strong passwords, avoiding suspicious links or attachments in emails, and backing up important data on a regular basis.

Additionally, it is important to be aware of the latest security threats and take steps to protect yourself against them. This can include installing anti-virus software, keeping your firewall enabled, and disabling unnecessary services or programs that could be used as an entry point for malicious actors. Finally, it is important to remain vigilant when online by being aware of phishing attempts or other suspicious activity. By following these tips, you can help ensure that your system remains safe from threats like the Zendaya ransomware.

January 11, 2023
Loading...

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.