{"id":514,"date":"2018-08-20T08:18:14","date_gmt":"2018-08-20T08:18:14","guid":{"rendered":"http:\/\/esolutions.lt\/blog\/?p=514"},"modified":"2018-08-24T08:15:23","modified_gmt":"2018-08-24T08:15:23","slug":"keypass-ransomware-data-encrypting-virus-spreads-in-more-than-20-countries","status":"publish","type":"post","link":"https:\/\/esolutions.lt\/blog\/keypass-ransomware-data-encrypting-virus-spreads-in-more-than-20-countries\/","title":{"rendered":"KEYPASS ransomware: data-encrypting virus spreads in more than 20 countries"},"content":{"rendered":"<h2>KEYPASS ransomware is creating more versions since the first attack at the beginning of August<\/h2>\n<p>Esolutions team has spotted this virus in the first week of August and a few weeks, this virus has spread\u00a0quite widely. In a\u00a0few days, it was known that virus striked in more than 20 countries around the world. The biggest amount of victims were reportedly from Brazil and Vietnam. This variant of ransomware has .keypass\u00a0extension that each file gets after the successful encryption.<\/p>\n<p>Also, as typical ransom demanding virus\u00a0<a href=\"https:\/\/www.2-spyware.com\/remove-keypass-ransomware.html\">KEYPASS ransomware<\/a> displays a ransom note:\u00a0!!!KEYPASS_DECRYPTION_INFO!!!.txt. In this message, the victim may see an explanation of this situation and the information about the<a href=\"https:\/\/www.csoonline.com\/article\/3193981\/security\/report-average-ransomware-demand-now-over-1000.html\"> payment<\/a>. $300 is the amount virus developers want\u00a0to get, and as usual, the payment should be in Bitcoin. A victim has only 72 hours to pay up if they want to get their data allegedly decrypted. But most of the cybersecurity experts advise people not to pay.<\/p>\n<h2>The hidden features of the ransomware<\/h2>\n<p>This virus has a feature of manual\u00a0control that needs to be activated with a specific key on the keyboard. This is not typical for other ransomware viruses. The feature allows hackers to gain access to the infected system and changing the victim&#8217;s ID, file extension,\u00a0and other encryption-related information. This makes KEYPASS\u00a0ransomware even more dangerous.<\/p>\n<p>Also,\u00a0KEYPASS\u00a0ransomware can be used as a spreader for other malware. This virus can open the backdoor for infections like trojans. This is very dangerous\u00a0because ransomware demands a payment directly, but <a href=\"https:\/\/blog.barkly.com\/top-banking-trojans-2017\">trojan<\/a>\u00a0can mine cryptocurrency or track your banking information without your knowledge.<\/p>\n<h2>Ransomware prevention tips<\/h2>\n<p>As a company related to cybersecurity for more than ten years, we have encountered a lot of malicious programs. For many years ransomware is one of the most dangerous cyber infections. The developers of this virus make\u00a0a\u00a0lot of money from this activity, and it allows them to gain profit easily. However, you as a victim should never pay the demanded amount of money. This cannot give positive results. The only thing you can do is try to avoid these infections as much as possible.<\/p>\n<p>There is a way to\u00a0keep your system safe from cyber infections like this dangerous ransomware. You need to pay more attention to processes happening on your device. And be aware that any <a href=\"http:\/\/about-threats.trendmicro.com\/RelatedThreats.aspx?language=tw&amp;name=Gateways+to+Infection%3A+Exploiting+Software+Vulnerabilities\">system vulnerability<\/a> can affect the security of your PC. The best solution is a reputable cybersecurity software. Antivirus and anti-malware tools should be essential. And the best way to ensure that your device is secure is keeping these programs up-to-date.<\/p>\n<p>Another great tip is to backup everything you own. Photos, videos, important documents should be backed up more occasionally\u00a0because if ransomware infects your device, it modifies all of your data and in most cases, without a possibility to decrypt the files. Keep your files on an external drive safely and be safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>KEYPASS ransomware is creating more versions since the first attack [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":515,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/514"}],"collection":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/comments?post=514"}],"version-history":[{"count":3,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/514\/revisions"}],"predecessor-version":[{"id":531,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/514\/revisions\/531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/media\/515"}],"wp:attachment":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/media?parent=514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/categories?post=514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/tags?post=514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}