What is @BLOCKED Ransomware
@BLOCKED is a ransomware infection that encrypts potentially valuable data and requires victims to perform certain actions in order to restore access to it. After running successful encryption, all filenames will be assigned a custom extension starting with a random string of characters and ending with @BLOCKED. For instance, a file like 1.pdf
will change to something like 1.pdf.i34ot23@BLOCKED
and become no longer accessible. Afterwards, successful encryption is followed by the creation of a ransom text note – also named with random characters preceding the “.txt” extension (for example, mesgwuibjpdrdum.txt). This note contains instructions on how to recover the encrypted data.
Your files have been encrypted.
If you want to restore files, send one more file us to the e-mail: unk92@keemail.me
Only in case you do not receive a response from the first email address
withit 24 hours, please see current
e-mail in shxee3mha3obdvlquppsfzunwdh4767d6a7b4mb4kg23ceswogrs2bad.onion.pet site
(shxee3mha3obdvlquppsfzunwdh4767d6a7b4mb4kg23ceswogrs2bad.onion in TOR browser)
It is better to send e-mail from google.com, yahoo.com or protonmail.com services.
From mail.ru or Yandex.ru the letter may not reach us.
Using another tools could corrupt your files, in case of using third party
software we dont give guarantees that full recovery is possible so use it on
your own risk.
Overall, the ransom note message says victims’ files have been encrypted. In order to return access to them, cybercriminals ask to send one encrypted file to their e-mail address (unk92@keemail.me). In case of no response within 24 hours, victims should open the attached link in the TOR browser and establish contact using the displayed e-mail from there. In addition, threat actors warn victims to use third-party tools at their own risk as there is no guarantee that they will recover the data completely and without complimentary damage. Although cybercriminals do not say exact conditions for decrypting the data, it is likely that they will demand a specific amount of money upon reaching out to them. Unfortunately, it is necessary to admit that the attackers are usually the only figures able to unlock access to data completely and safely. As of the date of publishing this article, there is no known third-party tool capable of bypassing encryption written by @BLOCKED Ransomware. For now, you can recover your data either by collaborating with ransomware developers or retrieving data from existing backup copies. Backups are copies of data stored on external devices such as USB drives, external hard drives, or SSDs.
It is always recommended to use backups over paying the ransom. First, using your own backups is completely free and second is that some cybercriminals fool their victims and do not provide any promised decryption tools/keys even after the demands are met. Thus, it is always a good idea to create regular backups in order to ensure the majority of data can be recovered (in case of unexpected loss or unforeseen ransomware infection). If no backups are present, you can try some third-party tools or attempt to recover from windows shadow copies using our guide below. However, these alternatives may not always be effective and are only successful in rare cases – for instance, when ransomware is flawed. Before starting manual recovery without the involvement of cybercriminals, it is crucial to delete the ransomware virus from your system so that it does not impact other files or spread to neighboring systems connected to the same network. Even if you choose to collaborate with them to decrypt files, it is still important to make sure the ransom is no longer present afterwards. Follow the guidelines in our article to perform full-fledged ransomware removal and protect your system against such threats in the future.
How @BLOCKED Ransomware infected your computer
Ransomware can infiltrate a poorly protected system in a variety of cunning methods. These methods often include phishing e-mail letters, unprotected RDP configuration, infected software installers (pirated or cracked), exploit kits, trojans, fake updates/license cracking tools, unreliable ads, backdoors, keyloggers, and other dubious channels. The goal of cybercriminals is usually to deceive users into downloading and opening some malicious files or links by mimicking legitimate organizations. For example, fraudulent e-mails may look like they were delivered by a trustworthy source, such as delivery companies, tax authorities, banks, and so forth. However, they are likely to contain malicious attachments disguised as genuine files like .DOCX, .XLSX, .PDF, .EXE, .ZIP, .RAR, or .JS. After opening them, it is possible that victims will be infected with some kind of malware.
To safeguard your system against ransomware, users should avoid interacting with suspicious download resources, torrent-sharing websites, dubious ads, potentially malicious attachments/links, and other types of content that may seem suspicious or compromised. Rely on downloading software only from reputable and official sources. Stay vigilant and cautious when dealing with suspicious content around the web. In our guide, you will not only learn how to delete ransomware but also get more practical tips and advice on how to protect your system from ransomware and other types of malware in the future.
- Download @BLOCKED Ransomware Removal Tool
- Get decryption tool for .@BLOCKED files
- Recover encrypted files with Stellar Data Recovery Professional
- Restore encrypted files with Windows Previous Versions
- Restore files with Shadow Explorer
- How to protect from threats like @BLOCKED Ransomware
Download Removal Tool
To remove @BLOCKED Ransomware completely, we recommend you to use SpyHunter 5. It detects and removes all files, folders, and registry keys of @BLOCKED Ransomware. The trial version of Spyhunter 5 offers virus scan and 1-time removal for FREE.
Alternative Removal Tool
To remove @BLOCKED Ransomware completely, we recommend you to use Norton Antivirus from Symantec. It detects and removes all files, folders, and registry keys of @BLOCKED Ransomware and prevents future infections by similar viruses.
@BLOCKED Ransomware files:
{random_string}.txt
{randomname}.exe
@BLOCKED Ransomware registry keys:
no information
How to decrypt and restore .@BLOCKED files
Use automated decryptors
Download Kaspersky RakhniDecryptor
Use following tool from Kaspersky called Rakhni Decryptor, that can decrypt .@BLOCKED files. Download it here:
There is no purpose to pay the ransom because there is no guarantee you will receive the key, but you will put your bank credentials at risk.
Dr.Web Rescue Pack
Famous antivirus vendor Dr. Web provides free decryption service for the owners of its products: Dr.Web Security Space or Dr.Web Enterprise Security Suite. Other users can ask for help in the decryption of .@BLOCKED files by uploading samples to Dr. Web Ransomware Decryption Service. Analyzing files will be performed free of charge and if files are decryptable, all you need to do is purchase a 2-year license of Dr.Web Security Space worth $120 or less. Otherwise, you don’t have to pay.
If you are infected with @BLOCKED Ransomware and removed from your computer you can try to decrypt your files. Antivirus vendors and individuals create free decryptors for some crypto-lockers. To attempt to decrypt them manually you can do the following:
Use Stellar Data Recovery Professional to restore .@BLOCKED files
- Download Stellar Data Recovery Professional.
- Click Recover Data button.
- Select type of files you want to restore and click Next button.
- Choose location where you would like to restore files from and click Scan button.
- Preview found files, choose ones you will restore and click Recover.
Using Windows Previous Versions option:
- Right-click on infected file and choose Properties.
- Select Previous Versions tab.
- Choose particular version of the file and click Copy.
- To restore the selected file and replace the existing one, click on the Restore button.
- In case there is no items in the list choose alternative method.
Using Shadow Explorer:
- Download Shadow Explorer program.
- Run it and you will see screen listing of all the drives and the dates that shadow copy was created.
- Select the drive and date that you want to restore from.
- Right-click on a folder name and select Export.
- In case there are no other dates in the list, choose alternative method.
If you are using Dropbox:
- Login to the DropBox website and go to the folder that contains encrypted files.
- Right-click on the encrypted file and select Previous Versions.
- Select the version of the file you wish to restore and click on the Restore button.
How to protect computer from viruses, like @BLOCKED Ransomware , in future
1. Get special anti-ransomware software
Use ZoneAlarm Anti-Ransomware
Famous antivirus brand ZoneAlarm by Check Point released a comprehensive tool, that will help you with active anti-ransomware protection, as an additional shield to your current protection. The tool provides Zero-Day protection against ransomware and allows you to recover files. ZoneAlarm Anti-Ransomware is compatible with all other antiviruses, firewalls, and security software except ZoneAlarm Extreme (already shipped with ZoneAlarm Anti-Ransomware) or Check Point Endpoint products. The killer features of this application are: automatic file recovery, overwrite protection that instantly and automatically recovers any encrypted files, file protection that detects and blocks even unknown encryptors.
2. Back up your files
As an additional way to save your files, we recommend online backup. Local storage, such as hard drives, SSDs, flash drives, or remote network storage can be instantly infected by the virus once plugged in or connected to. @BLOCKED Ransomware uses some techniques to exploit this. One of the best services and programs for easy automatic online backup is iDrive. It has the most profitable terms and a simple interface. You can read more about iDrive cloud backup and storage here.
3. Do not open spam e-mails and protect your mailbox
Malicious attachments to spam or phishing e-mails are the most popular method of ransomware distribution. Using spam filters and creating anti-spam rules is good practice. One of the world leaders in anti-spam protection is MailWasher Pro. It works with various desktop applications and provides a very high level of anti-spam protection.