You can check the latest ransomware information.
[ Surtr ransomware ]
[Virus/Malware Activity Report: Surtr Ransomware]
As a security breach presumed to be Surtr ransomware has occurred,
we would like to confirm the situation and provide a warning as follows.
Surtr ransomware
The ransomware in question is called Surtr and is . It appears that all files are being changed with the extension [JohnD3crypt@gmail.com].SURT.
How it works
file version
[Figure 1 File version]
[Figure 2 File properties]
behavioral process
Stop security module service/delete backup
Stop the services of some security programs and delete backup copies.
[Stop module service in Figure 3 / Delete backup]
Deleting shadow copies
Delete shadow copies to prevent restoration of encrypted files
[Figure 4 Deleting shadow copies]
Disable Windows recovery function
Disable the Windows recovery function to make recovery difficult for users.
[Figure 5 Disabling Windows recovery function]
Infection results
Guide files are created under the names SURTR_README.txt / SURTR_README.hta in each folder, and when encryption is performed, the files are changed to < [JohnD3crypt@gmail.com].SURT>.
[Figure 6 Infection result 1]
[Figure 7 Infection result 2]
[Figure 8 Infection result 3]
White Defender compatible
It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.
[Figure 9 Block message]
[Figure 10 Block message]
[Figure 11 Blocking details]