This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects Ransom malware activity on the infected machine.
Ransom malware encrypts certain types of files stored on local and mounted network drives on the compromised computer. It then issues a ransom demand in order to restore encrypted files.