Threat Database Ransomware KUZA Ransomware

KUZA Ransomware

The KUZA Ransomware is a menacing threat. The KUZA Ransomware encrypts victim files and appends the '.Ripa' extension to them, sometimes also adding the cyber criminals' email addresses. Upon infection, the KUZA Ransomware delivers a ransom note named '#Read-for-recovery.txt' to victims, demanding payment for decryption. The KUZA Ransomware belongs to the notorious Proton Ransomware family. 

Key Characteristics of the KUZA Ransomware:

  1. File Encryption: KUZA encrypts files and adds the '.Ripa' extension to them along with the cyber criminals' email address for contact.
  2. Ransom Message: Victims receive a ransom message called '#Read-for-recovery.txt' to initiate contact for payment and decryption.
  3. Contact Details: Cybercriminals provide two email addresses for communication: amir206amiri2065sa@gmail.com and amir206amiri2065sa@tutamail.com.
  4. Infection Vectors: The KUZA Ransomware can infiltrate computers via fraudulent advertisements,  torrent websites, or infected email attachments containing macros.

Protecting Against the KUZA Ransomware:

To safeguard against KUZA and similar ransomware threats:

  • Use Caution with Email Attachments: Avoid opening suspicious attachments, especially from unknown senders.
  • Be Wary of Torrents and Advertisements: Refrain from downloading software or clicking on advertisements from untrustworthy sources.
  • Implement Security Software: Install reputable anti-malware software and update it to detect and prevent ransomware attacks.

The KUZA Ransomware underscores the critical need for effective cybersecurity measures to mitigate the risk of data loss and financial harm.

 The ransom message that victims of the KUZA Ransomware will receive reads:

'~~~ KUZA ~~~
>>> What happened?
We encrypted and stolen all of your files.
We use AES and ECC algorithms.
Nobody can recover your files without our decryption service.


>>> How to recover?
We are not a politically motivated group and we want nothing more than money.
If you pay, we will provide you with decryption software and destroy the stolen data.


>>> What guarantees?
You can send us an unimportant file less than 1 MG, We decrypt it as guarantee.
If we do not send you the decryption software or delete stolen data, no one will pay us in future so we will keep our promise.


>>> How to contact us?
Our email address: amir206amiri2065sa@gmail.com
In case of no answer within 24 hours, contact to this email: amir206amiri2065sa@tutamail.com
Write your personal ID in the subject of the email.


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>> Your personal ID: - <<<<<
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>


>>> Warnings!
- Do not go to recovery companies, they are just middlemen who will make money off you and cheat you.
They secretly negotiate with us, buy decryption software and will sell it to you many times more expensive or they will simply scam you.
- Do not hesitate for a long time. The faster you pay, the lower the price.
- Do not delete or modify encrypted files, it will lead to problems with decryption of files.'

Trending

Most Viewed

Loading...