RemindMe Ransomware
Posted: April 25, 2016
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 10/10 |
---|---|
Infected PCs: | 15 |
First Seen: | April 25, 2016 |
---|---|
OS(es) Affected: | Windows |
The RemindMe Ransomware is a threatening file encryptor that blocks your access to your data with an encryption routine, forcing you to pay its perpetrators for a decryption service tailored to your infection. Although some threat authors do provide real decryption services, the natural risks with such transactions make it preferable to use any other means of restoring encrypted content, when at all possible. Malware experts also stress using backups for limiting the RemindMe Ransomware's damages and anti-malware tools for properly deleting the RemindMe Ransomware.
A Trojan's Reminder You won't Soon Forget
Successfully profiting from a threat campaign isn't always a matter of doing something different from the competition. Since the rise of CryptoLocker in 2013, con artists have been using minor variations of the same code and tactics to deliver new attack campaigns, as seen with the RemindMe Ransomware. This Trojan dates to 2016 and has no public decryptor available to help victims reverse its attacks while avoiding its ransom demands.
Using distribution strategies not yet verified, the RemindMe Ransomware installs itself automatically and then scans your hard drives for suitable targets. Files most likely of being encrypted by the RemindMe Ransomware include those of popular Microsoft Office formats, along with general media formats, such as JPG or MP3. Besides adding the '.remind' extension to the name of each file, the RemindMe Ransomware also runs an encryption process, preventing you from opening them.
The RemindMe Ransomware's payload concludes with placing both TXT and HTML files in the same directories as any encrypted data. Both formats of files contain the same ransom message, demanding an unusually high (USD value of over eight hundred) Bitcoin payment and advice on how to make the transaction. Like the Jigsaw Ransomware and the CryptoBit Ransomware, the RemindMe Ransomware also places its victims under a sharp time constraint by threatening to delete any unpaid-for data after five days.
Getting out of a File Ransoming Attack without a Cent Paid in Ransoms
PC owners with truly essential data on their machines should use non-local backup strategies for straightforward means of recovering from the RemindMe Ransomware attacks. A majority of threats in the RemindMe Ransomware's classification will take action against local, Windows-based backups, but malware analysts see relatively few of them possessing the functions necessary for compromising cloud server accounts. Additionally, disconnected storage devices, such as the ubiquitous USB drive, always can restore your data from safe backups, thereby making the theoretical inviolability of this threat's encryption irrelevant.
Once its encryption and message-dropping routines finish, the RemindMe Ransomware has no further observed functions. Despite its limited focus, the RemindMe Ransomware's presence may correlate to other security issues, including the installation of backdoor Trojans and other threats that could give fraudsters access to your PC. Using dedicated anti-malware products for deleting the RemindMe Ransomware while scanning the rest of your machine will prevent related threats from continuing to cause problems beyond the scope of the initial encryption attack.
Because the RemindMe Ransomware's campaign is dated recently, malware experts can provide no information regarding free decryption services for encrypted data. However, PC users with appropriate backup strategies should, as usual, find it easy to ignore this limitation.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.