IIOF Ransomware Join the STOP/Djvu Ransomware Family
Over the past several years, ransomware has become one of the most prominent malware threats victimizing PC users worldwide. Among different groups of ransomware, standing prominently is the STOP/Djvu Ransomware family that, over time, has released hundreds of new variants, quickly becoming one of the world’s most notable ransomware gangs.
Now, IIOF Ransomware has been uncovered as yet another strain from the family. It is referred to as IIOF based on the .IIOF extension it uses to append infected files. The ransomware operates like its counterparts from the STOP/Djvu group and encrypts files before making a ransom demand.
IIOF Ransomware scans a victim’s computer to look for user-generated files. It then targets the files that may contain valuable information, including databases, spreadsheets, archives, pictures, and videos. Additionally, the hackers behind IIOF Ransomware deliver a ransom note that contains information about the infection and the hackers’ ransom demands.
Text on Screen: The Ransom Demand Associated with IIOF Ransomware
IIOF Ransomware’s operators promise a decryption key to unlock the affected files in exchange for $980. However, they do offer a 50% discount if victims establish communication within 72 hours after encryption. The ransom note also instructs users to contact the criminals via email@example.com or firstname.lastname@example.org. If contacted, IIOF Ransomware’s operators also offer to decrypt one file for free to display they can unlock all the affected files.
How Do I Deal with an IIOF Ransomware Attack?
Although cooperating with hackers seems like an easy way out of the situation, we strongly advise victims not to engage and employ a reputable malware remediation program to scan for and remove IIOF Ransomware. To prevent data loss in the case of another ransomware attack, please consider backing up your data on an external hard drive or virtual cloud storage.