A text ransom note is added on any valid drive and files are encrypted afterwards using the Chacha20 algorithm. Moreover, the booting configuration is reconfigured, and a few reporting services are killed.Īfter that, it is time for the malware to encrypt the content of your drives. It continues by deleting special file execution options and quietly removing shadow copies on all the machine’s drives. First, it blocks ownership actions and debugging processes, which can betray its presence. Once it reaches a computer, the TargetCompany ransomware initiates its takeover work. Suggestively called the Avast Decryption Tool for TargetCompany, this application makes it possible to run a brute force attack and find the key that offers access to the all the encrypted files. Avast released a dedicated decryption tool for the TargetCompany in the attempt to allow victims of the aforementioned ransomware to unlock their files securely, without having to pay a dime as a ransom to get the encryption key.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |