Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

PClock ransomware makes record by targeting over 2500 file extensions


  • Please log in to reply
1 reply to this topic

#1 Grinler

Grinler

    Lawrence Abrams


  • Admin
  • 43,504 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:10:08 PM

Posted 15 April 2015 - 01:50 PM

When ransomware encrypts your data it looks for specific file extensions that it will encrypt. The amount of file extensions that Ransomware typically targets is between 20-60 file extensions. Last week, Fabian Wosar of Emsisoft discovered a new variant of the PClock ransomware that takes it to the next level by targeting 2,583 file extensions.

 

pclock-ransomware.jpg



PClock is a ransomware that impersonates the infamous CryptoLocker, which thankfully Fabian has been able to provide free decryption for. This large amount of targeted file extensions is unprecedented and only shows the developers commitment to hurting his victims as much as possible. Thankfully, Fabian continues to be able to offer free decryption for the PClock ransomware, so even with all these new encrypted files, you still do not have to pay a dime to get them back.

For a full list of the targeted extensions, you can see this file.


BC AdBot (Login to Remove)

 


#2 USASAgencyman

USASAgencyman

  • Members
  • 42 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NE FL
  • Local time:10:08 PM

Posted 24 April 2015 - 01:42 PM

If they've gotten this list up, they'll have a certain file type I've been watching, and probably soon.  

 

Fabian is a wunderworks kind of guy, though...

 

I guess they figure the average victim will pay and the fake "encryption' process they use is no doubt much faster.  

 

Bruce Hinton






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users