What is the Zendaya Ransomware?
Zendaya is a malicious program that belongs to the VoidCrypt ransomware family. It was discovered by our researchers while inspecting new submissions to VirusTotal.
Table of Contents
How does the Zendaya ransomware affect files?
It encrypts files and changes their filenames with a unique ID, the cyber criminals' email address, and a ".Zendaya" extension. For example, a file named "1.jpg" would appear as "1.jpg.(MJ-VY3946857120)(Decryption.helper@aol.com).Zendaya".
After completing the encryption process, Zendaya created two identical ransom notes – "Decryption-Guide.HTA" and "Decryption-Guide.txt". These messages inform victims that their files have been locked and they must contact and pay the attackers in order to restore them. Victims are also warned that any attempts to rename/modify encrypted files, use third-party recovery tools, or reinstall the operating system will result in permanent data loss.
The Zendaya ransomware is particularly dangerous because of its ability to encrypt files quickly and efficiently without any warning or indication of what is happening until it is too late for victims to do anything about it . It is important for users to be aware of this threat and take the necessary precautions to protect their data.
What does the Zendaya ransomware note look like?
The full text included in the ransom note of the Zendaya ransomware reads as follows:
Your Files Are Has Been Locked
Your Files Has Been Encrypted with cryptography Algorithm
If You Need Your Files And They are Important to You, Dont be shy Send Me an Email
Send Test File + The Key File on Your System (File Exist in C:/ProgramData example : RSAKEY-SE-24r6t523 pr RSAKEY.KEY) to Make Sure Your Files Can be Restored
Make an Agreement on Price with me and Pay
Get Decryption Tool + RSA Key AND Instruction For Decryption Process
Attention:
1- Do Not Rename or Modify The Files (You May loose That file)
2- Do Not Try To Use 3rd Party Apps or Recovery Tools ( if You want to do that make an copy from Files and try on them and Waste Your time )
3-Do not Reinstall Operation System(Windows) You may loose the key File and Loose Your Files
4-Do Not Always Trust to Middle mans and negotiators (some of them are good but some of them agree on 4000usd for example and Asked 10000usd From Client) this Was happened
Your Case ID :-
OUR Email :Decryption.helper@aol.com
in Case of no answer: Decryption.help@cyberfear.com
How to keep your system safe from threats like the Zendaya ransomware?
The best way to keep your system safe from threats like the Zendaya ransomware is to practice good cyber hygiene. This includes regularly updating your operating system and applications, using strong passwords, avoiding suspicious links or attachments in emails, and backing up important data on a regular basis.
Additionally, it is important to be aware of the latest security threats and take steps to protect yourself against them. This can include installing anti-virus software, keeping your firewall enabled, and disabling unnecessary services or programs that could be used as an entry point for malicious actors. Finally, it is important to remain vigilant when online by being aware of phishing attempts or other suspicious activity. By following these tips, you can help ensure that your system remains safe from threats like the Zendaya ransomware.








