The STOP/Djvu Ransomware Family Continues to Grow with LLTT Ransomware
Since 2018, the prolific and evergrowing STOP/Djvu Ransomware family has released hundreds of new variant strains. LLTT Ransomware has been uncovered as yet another infection variant from the STOP/Djvu Ransomware family. It is referred to as LLTT based on the .LLTT extension it uses to append encrypted files. The ransomware operates like its counterparts from the STOP/Djvu group and encrypts files before making a ransom demand.
After infiltrating a computer, LLTT Ransomware scans it, looking for user-generated files. It then affects the files that may contain valuable information, including databases, spreadsheets, archives, pictures, and videos. Additionally, the hackers behind LLTT Ransomware deliver a ransom note that contains information about the infection and the hackers’ ransom demands.
Unfortunately, an online decryption tool that would unlock the files encrypted by LLTT Ransomware is not available at the moment, and the only reliable way to recover encrypted files is to restore them from a backup. You could also possibly use alternative data recovery options. However, there’s no guarantee that alternative data recovery tools will unlock the encrypted files.
LLTT Ransomware’s operators promise to unlock the affected files for $980. However, they do offer a 50% discount if victims establish communication within 72 hours after encryption. The ransom note also instructs users to contact the criminals via firstname.lastname@example.org, email@example.com, or their Telegram account @datarestore. If contacted, LLTT Ransomware’s operators also offer to decrypt one file for free to display they can unlock all the affected files.
How Do I Deal with the LLTT Ransomware Attack?
Although cooperating with hackers seems like an easy way out of the situation, we strongly advise victims not to engage and employ a reputable malware remediation program to scan for and remove LLTT Ransomware. To prevent data loss in the case of another ransomware attack, please consider backing up your data on an external hard drive or virtual cloud storage.