Accès privé, sécurisé et gratuit au contenu mondial en 10 fois plus rapide avec  iTop VPN  en un clic.
Obtenez-le maintenant

L’expert en

Solution informatique

Quantité limitée
Vite, J’en Profite (60s)
Page d'accueil > Presse > Connaissance

How to Protect Yourself from Thanatos Ransomware

2017 is a bad year for many organizations and individual computer users who suffered WannaCry, NotPetya, GandCrab and etc. But cybercriminals never stop their steps to release new infections. A new ransomware-type virus called Thanatos has been detected and is infecting computers worldwide. Like all ransomware attacks, Thanatos encrypts the files and lets victims to pay the ransom to unlock their files. In particular, Thanatos is the first ransomware to accept Bitcoin Cash - a new cryptocurrency that was spun off from Bitcoin.

How does Thanatos Ransomware encrypt a computer?

Once a computer is infected, all encrypted file will be changed to the extension “.THANATOS”.

1.jpg


And a ransom popup note in README.txt will show up every time the user tries to log in. Thanatos demands the victims to pay $200 USD ransom (accepted in Bitcoin, Etherum, Bitcoin Cash) to decrypt their files. 

2.png


However, it’s unlikely to get the encrypted files back even if cyber criminals get the ransom. According to researchers, Thanatos does not store encryption keys for infected targets. So do not pay any ransom for any reason!

How to prevent Thanatos Ransomware?

The first thing is to backup the important data regularly. This is very crucial to reduce the risk of losing personal data from any unexpected attacks. Another way also the most effective method to prevent ransomware like Thanatos is to install a powerful anti-ransomware engine on the computer.

Now IObit Malware Fighter 5 can help users prevent Thanatos in an easy way. Its anti-ransomware engine will detect Thanatos with the latest database and offer a one-click solution to remove the virus for the first time. IObit Malware Fighter 5 is an advanced PC security software that detects and removes infections and other security threats in real-time.

3.png

5.png

Nous utilisons des cookies pour améliorer votre expérience sur nos sites Web.
En poursuivant votre navigation sur notre site, vous acceptez l'utilisation de cookies et adhérez à notre politique de confidentialité.

J'accepte