Ransom.GlobeImposter is a ransomware application that will encrypt files on a victim machine and demand payment to retrieve the information. Ransom.GlobeImposter is also known as Fake Globe due to how the software mimics the Globe ransomware family . Ransom.GlobeImposter may be distributed through a malicious spam campaign, recognizable only with their lack of message content and an attached ZIP file. This type of spam is called a “blank slate.” Ransom.GlobeImposter is also distributed via exploits and malicious advertising, fake updates, and repacked infected installers.
Ransom.GlobeImposter may run silently in the background during the encryption phase and not provide any indication of infection to the user. Ransom.GlobeImposter may prevent the execution of Antivirus programs and other Microsoft Windows security features and may prevent system restoration as a means to solicit payment. Ransom.Cryptomix may display a warning after successful encryption of the victim machine.
Ransom.GlobeImposter may be distributed using various methods. This software may be packaged with free online software, or could be disguised as a harmless program and distributed by email. Alternatively, this software may be installed by websites using software vulnerabilities. Infections that occur in this manner are usually silent and happen without user knowledge or consent.
Systems affected by ransomware are rendered unusable due to files that are typically used for regular operations being encrypted.
Affected users who choose to pay the threat actors behind ransomware campaigns in exchange for access to data may find that they don’t get their files back. There is also no sure way to know that threat actors will honor their end of the deal after paying the ransom.
Affected users who chose to pay the threat actors may also find themselves likely targets for future ransomware campaigns.
Data held hostage that wasn’t given back to users or deleted after the ransom has been paid can be used by threat actors either to (a) sell on the black market or (b) create a profile of the user they can use for fraud.
Malwarebytes protects users from the installation of Ransom.GlobeImposter.
Malwarebytes can detect and remove Ransom.GlobeImposter on business machines without further user interaction.
To remove Ransom.GlobeImposter using Malwarebytes business products, follow the instructions below.
If you have infected machines that are not registered endpoints in Malwarebytes Endpoint Protection, you can remove Ransom.GlobeImposter with our Breach Remediation tool (MBBR).
You can use Malwarebytes Anti-Malware v1.80, which is included in your Malwarebytes Endpoint Security deployment to scan and remove Ransom.GlobeImposter.
Malwarebytes can detect and remove Ransom.GlobeImposter without further user interaction.
Take note, however, that removing this ransomware does not decrypt your files. You can only get your files back from backups you made before the infection happened.
Ransom file extensions
Your intro to everything relating to cyberthreats, and how to stop them.