iolo WW

Ransomware

Articles about removing Windows lockers, Browser lockers, Crypto-viruses and other types of blackmailing threats.

How to remove Udacha Ransomware and decrypt .udacha files

0
Udacha is a ransomware virus that encrypts data with AES+RSA algorithms and demands payment of 490$ (0.013 BTC) in order to return it. This information is visible inside of the ReadMe_Instruction.mht file, which is created after encryption puts its finishing touches onto the data. Prior to this, however, users will see their files changed with the .udacha extension. To illustrate, a file like 1.pdf will change to 1.pdf.udacha and reset its shortcut icon. Below, you can see the full information that is written within the ransom note.

How to remove GABUTS PROJECT Ransomware and decrypt .im back files

0
GABUTS PROJECT is a ransomware virus that encrypts system-stored data to extort money for its return. It does so by appending the .im back extension to each modified file. Files like music, videos, pictures, and documents will acquire the new extension and reset their original shortcut icons. Here is an example of how encrypted files will look like - 1.pdf.im back; 1.mp4.im back; 1.png.im back, 1.docx.im back, and so forth. After this, the virus features a pop-up window and creates the "gabuts project is back.txt" file containing ransom instructions. The text is written in first person with requests to send 100 BTC for data decryption. This is exactly the price victims should send in order to restore the data. It is also mentioned this payment has to be done within 1 day after infection. To begin communication, victims should write to the pinned e-mail address. According to the text, there is also an option to decrypt 1 file by accessing the tor link. Unfortunately, nobody will pay the price of 100 Bitcoins (5,712,670$) unless it is a big corporation that lost extremely important data.

How to remove ThunderX 2.1 Ransomware and decrypt .RANZY, .tx_locked or .lock files

0
Also known as Ranzy Locker, ThunderX 2.1 is a new ransomware sample that runs thorough data encryption. Depending on which version attacked your system specifically, you may see one of these 3 different extensions assigned to data - .RANZY, .RNZ, .tx_locked or .lock. To illustrate, an innocent file like 1.pdf will change to 1.pdf.ranzy, 1.pdf.tx_locked, or 1.pdf.lock at the end of encryption. It will also reset its shortcut to blank. Right after this, the virus creates a text note named readme.txt that contains ransom instructions. Cybercriminals call victims to follow the listed instructions as this is the only option to recover your data. All files have been rendered inaccessible with the help of secure encryption algorithms. To revert these consequences, victims are guided to contact developers through e-mail and buy unique decryption software. While sending a message, it is also required to attach a key string and personal ID from the note. In addition, they offer to send 3 files and receive them decrypted for free. They claim this is a guarantee of their trustworthiness and ability to restore the data. Nobody apart from victims knows how much money extortionists behind ThunderX 2.1 demand.

How to remove Babyduck Ransomware and decrypt .babyduck files

0
Babyduck is a ransomware infection that encrypts data by assigning the .babyduck extension. The word encryption means users will no longer be able to open system-stored files because they are blocked. Those files will undergo two visual changes - a new extension and a reset of shortcut icons. To illustrate, a file like 1.pdf will be altered to 1.pdf.babyduck and drop its icon to blank. Right after this, Babyduck creates a text note with ransom instructions (README.babyduck). Research related to this ransomware version has been temporarily frozen and not yet updated. The only thing that stands out clearly is how encrypted data will look after the ransomware attack. Despite there is no precise information on ransom instructions, they are more likely similar to other file-encryptors. Cybercriminals will probably ask you to pay for special decryption software that will access your data. The payment can be usually done only in cryptocurrency like Bitcoin. Apart from this, it is also common to see extortionists offer free file encryption.

How to remove SUPERSUSO Ransomware and decrypt .ICQ_SUPERSUSO files

0
SUPERSUSO is a ransomware program that uses strong encryption algorithms to cut users from accessing their own data. Such a change is meant to stimulate people into paying the so-called ransom to recover encrypted files. Victims will learn about file encryption by new extensions assigned to them. SUPERSUSO developers use the .ICQ_SUPERSUSO extension to rename all the blocked data. For instance, a file like 1.pdf will change to 1.pdf.ICQ_SUPERSUSO and reset its original icon. The same will be applied to all data blocked across your system. After this, SUPERSUSO issues a text file named #Decrypt#.txt to explain recovery instructions. At first, victims are instructed to install ICQ software for PC, Android, or IOS and write to cybercriminals' recipient address, which is mentioned in the note. ICQ is a reliable and legitimate messenger used by cybercriminals to establish anonymous communication with their victims. Should victims fail to contact developers within 72 hours, the compromised information will be gathered and leaked to darknet markets.

How to remove Shasha Ransomware and decrypt .shasha files

0
Shasha is the name of a ransomware virus that encrypts and changes data with the .shasha extension. The new extension is not an essential part of the encryption, but rather a visual aspect meant to highlight the blocked data. If you see this extension assigned to most of the data like this 1.pdf.shasha, then you are undoubtedly infected with ransomware. The developer's next step after blocking access to files is to explain how to recover it back. For this, cybercriminals in charge of the Shasha virus create a text note called READ_ME.txt and change desktop wallpapers. Inside of this note, extortionists claim they are the only figures able to decrypt your files. To be more precise, they are the ones holding private keys and decryption software that can unlock the data. Victims are requested to buy it for 50$ in BTC. The payment has to be sent through the Bitcoin address attached in the note. Unfortunately, it is quite uncertain how cybercriminals are going to send the purchased decryption software to you.

How to remove CommonRansom Ransomware and decrypt .commonransom files

0
CommonRansom is classified as a ransomware virus that encrypts data stored on infected devices to demand payment for its return. This version was discovered by a malware researcher named Michael Gillepsie. Just like many ransomware infections, CommonRansom assigns its own extension to highlight the blocked data. All data that got encrypted by CommonRansom will change like this file here - 1.pdf > 1.pdf.[old@nuke.africa].CommonRansom. After this, one more thing left to initiate by the virus is ransom note creation. The name of the note is DECRYPTING.txt and it is put to each folder with infected files. This note says victims have 12 hours ahead to request data decryption, otherwise, there will be no chance to return it anymore. There is also a template that should be used when contacting cybercriminals by their e-mail address. The attached template is actually very suspicious since it requests victims to write their PC RDP port, a username along with password used to log into the system, and the time when you paid 0.1 BTC to the outlined crypto address.

How to remove Gyjeb Ransomware and decrypt .gyjeb files

0
Gyjeb is a ransomware virus that runs data encryption to extort money from victims. It looks very similar to Keq4p Ransomware, which means they are likely to come from the same malware family. Just like Keq4p, Gyjeb Ransomware assigns a random string of senseless symbols along with its own .gyjeb extension. To illustrate, a file like "1.pdf" will change its look to something like 1.pdf.wKkIx8yQ03RCwLLXT41R9CxyHdGsu_T02yFnRHcpcLj_xxr1h8pEl480.gyjeb and reset its original icon. After all files end up edited this way, the virus creates a text note called nTLA_HOW_TO_DECRYPT.txt which entails decryption instructions. You can familiarize yourself with this note in the screenshot below.