Rapid V3 Ransomware (a.k.a Rapid 3.0 Ransomware) is new iteration of notorious Rapid Ransomware. This version uses AES encryption algorithm and can append following extensions to user files: .no_more_ransom, .ezymn, .rpd, .[5-random-characters]. Currently, there is no decryptor with confirmed working capacity for Rapid V3 Ransomware. However, using backups, recovery software or other advices from this page can help you recover encoded files. Virus uses the same template for ransom note. Some variation create ransom note with name: How Recovery Files.txt. Rapid V3 Ransomware extorts 0,7 BitCoins (BTC) for recovering files from decryption. Users can contact developers using e-mail email@example.com, which is reference to and mockery of a famous security researcher from Bleeping Computer forum, who has nickname “demonslay335”. There is information about the victims from the following countries: USA, Iran, Germany, Japan, Benin, South Korea, Indonesia, Spain, Malaysia, India.
Rapid Ransomware is nasty virus, that encrypts user files using AES encryption algorithm and demands ransom for decryption. All affected files get .rapid extension, in some versions .paymeme suffix is added. Rapid 2.0 Ransomware appends extensions, that contains 5 random letters in uppercase. Extension is unique for every PC. Unlike other similar ransomware threats, it does not do one time encryption, but continues to encode every new file on victims computer, whether it was just created or copied. Amount of ransom varies from $500 to $1500 and have to be paid in BitCoins. Using BitCoin payments and TOR websites, makes it difficult to find location of malefactors.