What is Neon Ransomware?
Neon is a ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX observed that among the prominent ransomware families in 2023, Djvu/Stop was one of the most used by the attackers. As per the research data, Djvu/Stop was mainly used in citizen-centric attacks but they can be used to target organizations as well.
Neon ransomware encrypts files and appends its extension (".neon") to filenames. Also, it drops the "_readme.txt" file that contains a ransom note. After executing the neon ransomware all files and folders gets encrypted and appends their filenames as ".neon" extension. For Example, a file titled "Sep2019.docx" appears as "Sep2019.docx.neon", "Jan2020.docx" as "Jan2020.docx.neon", and so on.
Screenshot of files encrypted by Neon ransomware
Neon Ransomware Overview
Neon ransomware notes inform victims that their files have been encrypted. It instructs victims to purchase the decrypt tool for $980 to decrypt all files and folders and also mentioned an email address "firstname.lastname@example.org" in readme.txt to get the software.
How does ransomware infect my computer?
Screenshot of Neon Ransomware Text file (“_readme.txt”)
Ransomware Note (“_readme.txt”) in Text
Don't worry, you can return all your files!
All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that's price for you is $490.
Please note that you'll never restore your data without payment.
Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours.
To get this software you need write on our e-mail:
Reserve e-mail address to contact us:
116[.]202[.]4[.]61 92[.]83[.]236[.]139 190[.]219[.]153[.]101 URLS
hxxp[:]//116[.]202[.]4[.]61/a81bcf59d85e6e13257840e65b9d1da8 hxxp[:]//zexeq[.]com/raud/get[.]php?pid=***&first=*** hxxp[:]//zexeq[.]com/files/1/build3[.]exe hxxp[:]//116[.]202[.]4[.]61/ hxxp[:]//116[.]202[.]4[.]61/files[.]zip hxxp[:]//colisumy[.]com/dl/build2[.]exe SHA256 d35d748aebd7c8112ee9d4d7cc38f430bca5b397afec832d51f3e086b828e845 c2c5560cede5fe447363e0d432707fc287312c20e92715b59700888e77eab92d 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0 Full Behaviour Report For the complete ransomware behavior report check out the below Secenurx Behaviour Report link and access our Complete Ransomware Report.