- Jul 22, 2014
- 2,525
A new ransomware is actively infecting victims called the Velso Ransomware. This ransomware appends the .velso extension to encrypted files and then drops a ransom note that contains an email address that a victim can use to contact the developer.
In this article I will provide a brief summary of what we know about the velso ransomware and how you can protect yourself from it. You can also discuss or receive support for the Velso Ransomware in our dedicated Velso Ransomware Help & Support Topic.
What we know about the Velso Ransomware
The Velso Ransomware was first discovered by Michael Gillespie when saw a submission to his ID-Ransomware site. After tweeting about the sample, another researcher named Martin Stopka was able to find a sample of the infection.
..
While it is not 100% confirmed, it appears that the Velso Ransomware is installed manually by an attacker hacking into a victim's computer via remote desktop services. The attacker then manually executes the ransomware file. This causes it to display the victim's ID and then the decryption key while it pauses waiting for the attacker to press a key on the keyboard.
Once the attacker has finished copying the two strings, they can press any key and start the process of encrypting the computer. You can see below what the ransomware looks like when it was executed by BleepingComputer.
..
...
In this article I will provide a brief summary of what we know about the velso ransomware and how you can protect yourself from it. You can also discuss or receive support for the Velso Ransomware in our dedicated Velso Ransomware Help & Support Topic.
What we know about the Velso Ransomware
The Velso Ransomware was first discovered by Michael Gillespie when saw a submission to his ID-Ransomware site. After tweeting about the sample, another researcher named Martin Stopka was able to find a sample of the infection.
..
While it is not 100% confirmed, it appears that the Velso Ransomware is installed manually by an attacker hacking into a victim's computer via remote desktop services. The attacker then manually executes the ransomware file. This causes it to display the victim's ID and then the decryption key while it pauses waiting for the attacker to press a key on the keyboard.
Once the attacker has finished copying the two strings, they can press any key and start the process of encrypting the computer. You can see below what the ransomware looks like when it was executed by BleepingComputer.
..
...