What is Isza Ransomware ?
Isza is a ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX observed that among the prominent ransomware families in 2022, Djvu/Stop was one of the the most used by the attackers. As per the research data, Djvu/Stop was mostly used in citizen centric attacks but they can be used to target organisations as well.
Isza ransomware encrypts files and appends its extension (".isza") to filenames. Also, it drops the "_readme.txt" file that contains a ransom note. After executing the Isza ransomware all files and folders got encrypted and appended their filenames with a ".isza" extension. For Example a file titled as "Sep2019.docx" appeared as "Sep2019.docx.isza", "Jan2020.docx" as "Jan2020.docx.isza", and so on.
Screenshot of files encrypted by Isza ransomware
Isza Ransomware Overview
Isza ransomware notes inform victims that their files have been encrypted. It instructs victims to purchase the decrypt tool for $980 to decrypt all files and folders and also mentioned an email address "email@example.com" in readme.txt to get the software.
How does ransomware infect my computer?
Screenshot of Isza Ransomware Text file (“_readme.txt”)
Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.
To get this software you need write on our e-mail:
Reserve e-mail address to contact us:
What can you do to avoid being a ransomware victim?
As dangerous as ransomware is, simply being aware and staying updated with the latest ransomware trends can go a long way in securing your data and systems. Here are helpful tips on how you can defend yourself from a likely attack.
Scrutinize emails & its attachments before opening them
Be wary of emails from unverified sources. You can check by communicating directly with the purported sender to confirm if they sent the messages. To check its validity, you can use SecneurX Sandbox to verify the sanity of the email
Avoid clicking embedded links found in unverified emails
Such social engineering tricks can lead to the download of ransomware. Additionally, be wary of sites that prompt you to enter a CAPTCHA code as this could be linked to a ransomware attack. To check its validity, you can use services like SecneurX Sandbox to verify the reputation of the site.
Back up your important files
While prevention is always better than the cure, having a backup of important files can at least lessen the potential damage done by a ransomware attack. While being locked out of your own system is always a bad thing, at least it's not a total disaster since you can always retrieve your important files. The 3-2-1 backup rule applies here—three backup copies of your data on two different media, and one of those copies in a separate location
Regularly update software, programs, applications
Updating them to the latest versions can provide an added layer of protection against online threats as some ransomware arrive via vulnerability exploits.
Use a layered protection suite