Acute is a new version of the ransomware called Phobos which was first discovered by GrujaRS. The purpose and objective of this ransomware is to encrypt data so that developers can ask for a ransom, furthermore Acute is designed to change the name of each compromised file by adding the unique ID of the victim, the developer’s email and the extension “.acute”.

The files are claimed to have been compromised and victims must purchase a decryption tool to restore them. Currently, the cryptographic algorithm Acute uses is unknown. However, in any case each victim is assigned a unique decryption key that is needed to recover the data but … As we have always said, you should never trust, it is not known if they will return your encrypted files and also pay it only helps their economic growth. Almost all cyber kidnapping virus developers ignore their victims even if they have made the payment, it is also because of these threats that it is so important to have backup copies to prevent these misfortunes.

Ransomware infections are often spread through third-party software download sources, spam campaigns, Trojans, as well as pirated software. Trojans are malicious applications that infiltrate computers and inject additional malicious software into them. Fake software update tools infect the system by taking advantage of bugs in old software versions or by installing malware instead of the selected application. Pirated programs allow users to bypass software activation and gain access to all of its features. However, since almost all of them are fraudulent, users often end up infecting their computers instead of getting free access to paid programs.

The truth is that there are many forms of infection and that is why you must always be prepared and with a cold head in these situations since something that we must not forget is that these forms of infection will always require the user’s concentration and they will try to cheat on you.

See also:
Nephilim Ransomware targets wealthy companies
DoppelPaymer – Ransomware targeting industries


2 comentarios en «Acute dangerous high-risk Ransomware»

Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *