

They would also warn that failure to meet the deadline nullifies the ransom price reduction and only the full payment would be acceptable. However, in order to persuade the victim to pay without delay, they would claim that the ransom fee would be reduced by half, thereby making it $490 if only the victim would be able to pay within three days maximum of being notified to make payment. In anticipation of the victim’s compliance, they would also drop two email addresses, namely: and If the victim decides to write them, they would respond by asking them to pay $980 as a ransom fee in exchange for decryption tools they would provide.

However, for them to restore the files for the victim, a certain amount of money must be paid as ransom. They would brag that very complex algorithm was used in the encryption, which makes it impossible to be reversed without their help. While still in the process of encrypting the files, the cybercriminals behind the attack will simultaneously send ransom messages called _readme.txt to different folders, notifying their victim about the ransomware attack and why they would have to comply with their demands if they are desirous of restoring their encrypted files. The ransomware drops a money-demanding note Then the criminals patiently wait until unsuspecting users download them and get their computer systems infected. The cybercriminals behind this ransomware typically distribute the virus by disguising the malicious executable as a pirated software setup and uploading it on online torrent platform. now transforms to 1.yu, 2.yu and 3.jpg.ccyu respectively following the encryption. To explain this more graphically, files that were hitherto saved with names like 1.jpeg, 2.docx, 3.jpg, etc. ccyu extension to all the file names, respectively. After successfully infecting a computer, the ransomware will go after every file contained in it, encrypt its data i.e., make it unreadable for the owner and afterward append. The operational method of this virus variant is quite similar to the others in the series before it.
#UNINSTALL RANSOMWHERE HOW TO#
Methods used by cybercriminals in spreading malware & how to protect your computer.Take action to protect your computer ASAP.The ransomware drops a money-demanding note.CCYU ransomware virus & its threat on computers.
