We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Ransom:Win32/Globeimposter
Aliases: No associated aliases
Summary
The GlobeImposter ransomware was first discovered in May 2017 when a malspam campaign was seen pushing ransomware. Some extensions of files encrypted by earlier versions of the family include .CHAK, .crypted!, .doc, .dream, .Ox4444, .TRUE, and .Tiger4444. The malware family uses RSA and AES encryption.
This ransomware encrypts the data on your disk and can stop you from using your device or accessing your data. It encrypts files, renders them inaccessible, and demands payment for the decryption key.
For information about ransomware and other human-operated ransomware campaigns, read these blog posts:
Users should take the following steps to mitigate the threat:
- Remove infected devices from the network.
- Disconnect external storage devices and shared folders.
- Inspect system logs for suspicious events.
There is no one-size-fits-all response if you have been victimized by ransomware. To recover files, you can restore backups. There is no guarantee that paying the ransom will give you access to your files.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.