Xam Ransomware Demands Payment in Tether Crypto

Our researchers discovered the Xam ransomware during an examination of new file samples. Ransomware is a form of malicious software that encrypts files to demand payment for their decryption.

After obtaining a sample of Xam, we ran it on our testing system. The program encrypted files and added a ".xam" extension to their names. For instance, a file named "1.jpg" would become "1.jpg.xam", and "2.png" would change to "2.png.xam". Following this encryption process, Xam generated a ransom note named "unlock.txt".

The ransom note from Xam informs the victim that their databases, documents, photos, and other important files have been encrypted. The victim is instructed to pay the attackers 100 USDT (Tether crypto currency) to obtain the decryption tool. As of the time of writing, this amount equates to approximately 100 USD.

Xam Ransom Note Demands $100 Worth of Tether

The full text of the Xam ransom note goes as follows:

Don't worry, you can Unlock your files.

All your files like documents, photos, databases and other important are encrypted

You must follow these steps To decrypt your files :
1) Send 100 USDT in this address TSvLRDHxLVnnRBujwTouDR4Z6syjaH3PPN (trc20)
2) After sending 100 usdt, just contact me in my telegram bot. This is my telegram bot username @Xm02Bot
3) After confirming we will give you a decrypter to unlock your all files.

Don't beg without sending money.

How Can You Protect Your Data Against Ransomware Attacks?

Protecting your data against ransomware attacks requires a combination of proactive measures and cybersecurity best practices. Here are some steps you can take to safeguard your data:

Keep Software Updated: Ensure that your operating system, software applications, and antivirus/antimalware programs are always up to date. Software updates often include patches for security vulnerabilities that can be exploited by ransomware.

Use Strong Security Software: Install reputable antivirus and antimalware software on all your devices. Keep these programs updated and enable real-time scanning and protection features.

Backup Your Data Regularly: Implement a regular and automated backup routine for your important data. Store backups offline or in a secure cloud environment that is not directly accessible from your primary network. This way, if your data is encrypted by ransomware, you can restore it from backup without paying a ransom.

Use Strong Passwords and Multifactor Authentication: Use complex passwords and consider implementing multifactor authentication (MFA) wherever possible to add an extra layer of security to your accounts and systems.

Limit User Privileges: Restrict user permissions to only those necessary for their roles. This can prevent ransomware from spreading across your network by limiting access to critical files and systems.

May 9, 2024
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.