Any files that are encrypted with Oled Ransomware will have an email followed by the .oled extension appended to the end of file and typically will leave files (ransom notes) named DECRYPTION.txt as explained here by Amigo-A (Andrew Ivanov).
.[black.mirror@qq.com].oled
Any files that are encrypted with Makop Ransomware will have an [ID random 8 character].<email> followed by the .makop, .CARLOS, .origami, .tomas, .zbw, .zes, .Hidden, .fireee, .captcha, .fair, .moloch, .vassago, .WKSGJ, .pecunia, .ID2020, .dark, .XDQD, .harmagedon, .code, .mkp, .phmqdw, .session, .ZFX, .stolen, .rajah, .read, .SOG, .chocolate, .rocklee, .reload, .datah extension appended to the end of file and typically will leave files (ransom notes) named README_WARNING_.txt, RESTORE_FILES_INFO.txt, +README-WARNING+.txt as explained here by Amigo-A (Andrew Ivanov). These are a few examples.
.[EFC17099].[makop@airmail.cc].makop .[16A95E8C].[Carlosrestore2020@aol.com].CARLOS .[9539E0E8].[KILLYOUASS@protonmail.com].zbw .[4B2E4630].[Johncastle@msgsafe.io].zes .[4B2E4630].[Garantos@mailfence.com].captcha .[1f5bb265].[Moloch_helpdesk@tutanota.com].moloch .[EC3B84551.[emcryptsupport@msgsafe.io].mkp .[E574F644].[Dekrypt24@tutanota.com].mkp .[2AF20FA3].[reload2024@outlook.com].reload
Hello guys, i have problem in the my network .
my server has been hacked and the data encrypted by this .makop ransonware is posting the rescue txt files and some encrypted files. if someone can help me, thank you, because these data are government data where I take care of the IT part.
arquive extension exemploe AD DENTARIA 2.pdf.[EFC17099].[makop@airmail.cc].makop
thank you for your attention and thank you who can help.