High
The devil ransomware, which is a part of the phobos family of ransomware, are quickly gaining momentum. They infect victim’s files and encrypt them appending the victim’s ID, add a “.devil” extension to filenames, and encrypt their email addresses. For example, a file such as “1.jpg” is renamed to a filename such as “1.jpg.id[1E857D00-2574].[decrypt4data@protonmail.com].devil“, and so on.
The ransomware encrypts the victim’s files and provides instructions on how to retrieve them using said instructions.
In this case, it creates the “info.txt” file and displays a pop-up window (info.hta).
Cyber criminals often attempt to trick people into installing malware by sending emails that are disguised as important or official, but actually contain malicious attachments and/or web links that download malicious files. If opened, these files/attachments infect operating systems with malware.
Some examples of files that are attached to these emails are Microsoft Office, PDF documents, JavaScript files, executable files such as .exe, and archives in ZIP, RAR and other formats. Malicious software is also installed when people open files downloaded through untrustworthy sources. – Tomas Meskauskas