Denmark Professionals Targeted by Well-Written PacMan Ransomware - How to, Technology and PC Security Forum |

Denmark Professionals Targeted by Well-Written PacMan Ransomware

Another ransomware attack has been detected to invade the systems of Danish chiropractors. The ransomware is dubbed Pacman and spreads via email. The corrupted messages contain a link to Dropbox where Pacman is hidden. Researchers believe the malicious software’s author may be a Dane with excellent engineering knowledge – due to the perfect Danish language and overall sophisticated nature of the treat.

Download a System Scanner, to See If Your System Has Been Affected By PacMan Ransomware.

Once activated, the malware starts locking any data that may seem important to the victim. The targeted information may consist of databases, images, documents. After it is encrypted, a ransom message is displayed on the screen saying that 24 hours are given to the person to pay a certain amount of money. If the money is not transferred within the given hours, the files no longer could be decrypted.Cinemax Video 1.9cV24.02

PacMan Ransomware Specifications

CSIS security experts have reached the conclusion that PacMan was developed in .NET and has keystroke logging functions. Keystroke logging or keylogging, is the deed of recording hence logging the keys hit on a keyboard, usually without the knowledge of the PC’s owner. Keylogging may be described as a way to monitor any user’s activities.
Pacman is also set to try continually to interfere with the operation of various Windows tools, such as Windows Backup, System Restore, and Task Manager.

The Man Behind PacMan

Experts believe that the cybercriminal may be a Dane. On one hand, the language used to perform the malicious activities is written in perfect Danish, and on the other, the targets seem to be carefully selected. Due to the attack’s refined character, security specialists defined it as a high risk, despite the narrow circle of targets.
In addition, PacMan’s code is marked as quite destructive, with the potential to be successful in many other professional areas. In order to secure their businesses, owners are advised to store all important data elsewhere, on external devices or in clouds. Another preservative option is not opening suspicious email attachments.

Spy Hunter system scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the malware tool. Find Out More About SpyHunter Anti-Malware Tool

Milena Dimitrova

An inspired writer, focused on user privacy and malicious software. Enjoys ‘Mr. Robot’ and fears ‘1984’.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share