Home Malware Programs Ransomware Tocue Ransomware

Tocue Ransomware

Posted: July 31, 2019

The Tocue Ransomware is a file-locker whose authors demand to receive a significant payment in exchange for a decryption tool. Sadly, victims of the Tocue Ransomware may not have many data recovery options available, since the Tocue Ransomware's encryption has proven to be secure and impossible to crack for the moment. The project is based on the STOP Ransomware family.

The Tocue Ransomware Joins the Ranks of the STOP Ransomware Family

The authors of the Tocue Ransomware may use various tricks to get their targets to run the threatening program on their computers – fake downloads, phishing emails, pirated media or software, etc. If you wish to keep your computer safe from file-encryption Trojans and other cyber threats, you should avoid downloading files from non-trustworthy sources. Furthermore, it is advisable to use an anti-malware application that receives regular updates.

Not stopping the Tocue Ransomware will result in the loss of lots of important files – the threat is able to encrypt images, documents, videos, archives, etc. Whenever it locks a file, it will add the '.tocue' extension to its name. In addition to this, the Tocue Ransomware provides victims with a ransom note by using the file '_readme.txt' that is placed on the desktop. The contents of this file reveal that the attackers want to be paid via Bitcoin, and the exact amount of money they ask for is set to $490. However, they warn all of their victims that the price will increase to $980 if the payment is not complete 72 hours after the attack. The last bit of valuable information there are the emails used for contact – gorentos@bitmessage.ch and gorentos2@firemail.cc.

Users whose files were compromised by the Tocue Ransomware should not give in to the extortion tricks used by the perpetrators. Instead of paying the ransom fee, they should use an anti-malware tool to dispose of the Tocue Ransomware and then look into data recovery options.

Loading...