RANSOMWARE EXTENSION LIST AND
HOW TO AVOID RANSOMWARE

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading…

If ransomware infected your computer, the type of ransomware that got the files encrypted can be identified by the extension added to the filename. Below are some of the latest ransomware extensions:

 
Ransomware Extension List

Ransomware Extension List

  • .Krab Provide The first in the ransomware extension list. .Krab extension is appended by the new variant of Scarab Ransomware called Krab.
  • -email-[email_address].AZER Provide One of the longest in the ransomware extension list. Azer crypto-virus adds this extension to the filename once the encryption process is complete.
  • .zzzzzzzz Provide Another Scarab variant adds .zzzzzzzz extension to the encrypted files.
  • .f41o1 Provide Got the 4th spot in the ransomware extension list. This extension is added by Globe Imposter ransomware.
  • .ppam Provide Extension of the new GlobeImposter2 variant.
  • .mdk4y Provide It is added by the newly discovered ransomware, Mdk4y.
  • .data Provide The extension the new French Jigsaw Ransomware variant is responsible for.
  • .GRHAN Provide The new Matrix Ransomware variant is responsible for the .GRHAN extension.
  • TrumpHead.exe Provide Added by the newly discovered TrumpHeard ransomware.
  • .tfude, .pdff, and .tro Provide All extensions are added by the Djvu ransomware.
  • .# <email># id # <id> Provide An extension Striked Ransomware appends at the end of the file name.
  • .israbye Provide Appends by Israbye ransomware.
  • _%ID%_{admin@prt-decrypt.xyz}.xyz Provide The longest extension in the ransomware extension list. It is added by the new variant of New Paradise ransomware.
  • .obfuscated Provide Obfuscated ransomware adds this to the filename before it drops a ransom note entitled Read Me.txt.
  • .cRh8, .3P7m, .aRpt, .eQTz, or .3RNu Provide Mischa Ransomware adds five extensions to the ransomware extension list.
  • .666 Provide Added by the BlackSheep Ransomware.
  • .777 Provide This extension is Ninja’s ransomware.
  • .aes Provide Added by the 7Zip Ransomware
  • .xcry7684 Provide Appended by Xcry.
  • .venom Provide The new Jigsaw Ransomware variant, Oscar.
  • .Cerber2 Provide Belongs to the Cerber 2 Ransomware.
  • .gif Provide the extension of the new GIF Dharma variant.
  • .HakunaMatata Provide Belongs to the Hakunamatata Ransomware
  • .locked Provide A new BitPaymer ransomware variant adds .locked extension to the encrypted files.
  • .ENCRYPTED. Provide An extension of the Apocalypse ransomware.
  • .James Provide It elongs to the new James ransomware.
  • .MRCR1, .RARE1 or .PEGS1 Provide A holiday spoiler ransomware called Merry Christmas adds three extensions to the ransomware extension list.
  • .REVENGE Provide Aadded by the vengeful Revenge ransomware.
  • .SUPERCRYPT Provide The extension to the file name before SuperCrypt Ransomware drops a ransom note.
  • .TheTrumpLockerf or .TheTrumpLockerp. Provide It belongs to TrumpLocker ransomware that displays the image of Donald Trump once the files have been encrypted.
If you find the extension you are looking for in the ransomware extension list, look for a decryptor to recover your files. Try alternative solutions instead of paying the ransom that never guarantees a file recover. Since ransomware attack is difficult to deal with, it is important to avoid falling victim to ransomware. Never wait until ransomware infects the computer. Apply the

RANSOMWARE EXTENSION LIST: Following Preventive Measures

1. Update the Software The reason software developers release software updates is to fix an existing issue with the application, which includes bugs and system vulnerabilities. Hackers can exploit these system vulnerabilities to inject ransomware. So it is important to keep the software updated. Patch management is a tool that Xcitium automatically downloads the latest version of the software online. 2. Install an Anti Malware Software An anti malware software keeps varieties of threats from the computer. A computer without an anti malware software is a like an unarmed soldier. The Internet is where all types of threats are lurking, so if you don’t have an anti malware installed on the computer, you will easily fall victim to a malware attack. In choosing an anti malware software, go for a reputable security software that can beat varieties of malware. Malware is constantly evolving, particularly ransomware. But a reliable security software can keep you safe.

Ransomware Extension List: Xcitium Advanced Endpoint Protection

What sets Xcitium Advanced Endpoint Protection apart from the other anti malware software? Auto- Containment – has contained 1,000,000,000 files with no report of infection. The Auto-Containment is a sandbox based technology built on Default-Deny. HIPS or Host Intrusion Prevention System – a defense against fileless malware that monitors the computer memory and registry against modification. Packet Filtering Firewall – Filters network traffic and monitors incoming and outgoing data to prevent inbound and outbound threats. Cloud-Based Verdict Platform – provides a verdict within 40 seconds. Protects the devices against the latest threats even if the security software hasn’t been updated. The Best Ransomware Protection – Xcitium Advanced Endpoint Protection was named the Best Ransomware Protection in the 2018 Cybersecurity Excellence Award. 85 Million Endpoint Devices Worldwide – Xcitium Advanced Endpoint Protection has been protecting 85 million endpoint devices worldwide. Download Xcitium Advanced Endpoint Protection now to protect your endpoint devices from ransomware infections.