What is BLUE LOCKER Ransomware
BLUE LOCKER is a high-risk infection classified as ransomware. Its main purpose lies in extorting money from victims after successful encryption of personal data. It assigns the new .blue extension and issues a text note called restore_file.txt to guide victims through the recovery process. This means a file like 1.pdf
will be altered to 1.pdf.blue
and reset its original icon. The text inside of the note is similar to other ransomware infections. You can get a close look at the content here below:
----------- [ Hello! ] ------------->
****BY BLUE LOCKER****
What happend?
----------------------------------------------
Your computers and servers are encrypted, backups are deleted from your network and copied. We use strong encryption algorithms, so you cannot decrypt your data.
But you can restore everything by purchasing a special program from us - a universal decoder. This program will restore your entire network.
Follow our instructions below and you will recover all your data.
If you continue to ignore this for a long time, we will start reporting the hack to mainstream media and posting your data to the dark web.
What guarantees?
----------------------------------------------
We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests.
All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems.
We guarantee to decrypt one file for free. email us.
How to contact us?
----------------------------------------------
You can write us to our mailbox : grepmord@protonmail.com
!!! DANGER !!!
DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them.
!!! DANGER !!
It is said that all files have been encrypted, backups deleted, and copied to the server of cybercriminals. To revert the damage and return back to normal experience with fully functioning files, victims should buy a universal decryptor held by malware developers. If you decide to ignore the requests of cybercriminals, they will start flushing your files on dark web resources. While contacting developers on the decryption, it is offered to send 1 file so they can unlock it for free. Communication between victims and cybercriminals is written to be established via e-mail methods (grepmord@protonmail.com). After getting in touch with them, victims will retrieve further instructions on how to pay and acquire the decryption software. Despite this being the only possible way to fully decrypt your files and maybe avoid publication of data, we advise you against paying the ransom. Judging by the statistics, many cybercriminals fool their victims and do not send any decryption instruments as a result. You can delete the virus and recover data without paying the ransom only if there are backup copies stored outside of the infected machine. Cloud or physical storage should do the trick to restore files for free. There is an option to try third-party decryptors, but they are less likely to help. As mentioned, BLUE LOCKER is set up with strong cryptographic algorithms that prevent interference of third-party programs. To remove the virus and learn all effective recovery methods, make sure to follow our tutorial below.
How BLUE LOCKER infected your computer
The most popular ways of how ransomware infections can spread into your system are trojans, e-mail spam letters, fake software installers or updates, various system vulnerabilities like unprotected RDP configuration, backdoors, keyloggers, web-injects, malicious ads, and others to mount this list. It is common to see many users getting infected via malicious files or links hidden inside of spam letters. This is a popular method that targets a big number of future victims. Such messages are usually based on templates from legitimate companies (e.g. DHL, DPD, FedEx) to make their content less suspicious. Even so, it is still easy to define whether such a message is malicious or not. As a rule, malware developers attach Word, Excel, PDF, JavaScript, Archive, or Executable files that store malicious infections. Because they are titled as something “important” or “urgent”, some users get tricked and open them up, which summons the virus. You are also likely to get infected if download fake software via some links attached to the letter. In order to minimize the risk of getting attacked by such threats in the future, it is necessary to be more careful and less naive when it comes to receiving such content from doubtful sources. We would also advise you to follow our tutorial below as there is plenty of useful information on system protection as well.
- Download BLUE LOCKER Ransomware Removal Tool
- Get decryption tool for .blue files
- Recover encrypted files with Stellar Data Recovery Professional
- Restore encrypted files with Windows Previous Versions
- Restore files with Shadow Explorer
- How to protect from threats like BLUE LOCKER Ransomware
Download Removal Tool
To remove BLUE LOCKER Ransomware completely, we recommend you to use SpyHunter 5. It detects and removes all files, folders, and registry keys of BLUE LOCKER Ransomware. The trial version of Spyhunter 5 offers virus scan and 1-time removal for FREE.
Alternative Removal Tool
To remove BLUE LOCKER Ransomware completely, we recommend you to use Norton Antivirus from Symantec. It detects and removes all files, folders, and registry keys of BLUE LOCKER Ransomware and prevents future infections by similar viruses.
BLUE LOCKER Ransomware files:
restore_file.txt
{randomname}.exe
BLUE LOCKER Ransomware registry keys:
no information
How to decrypt and restore .blue files
Use automated decryptors
Download Kaspersky RakhniDecryptor
Use following tool from Kaspersky called Rakhni Decryptor, that can decrypt .blue files. Download it here:
There is no purpose to pay the ransom because there is no guarantee you will receive the key, but you will put your bank credentials at risk.
Dr.Web Rescue Pack
Famous antivirus vendor Dr. Web provides free decryption service for the owners of its products: Dr.Web Security Space or Dr.Web Enterprise Security Suite. Other users can ask for help in the decryption of .blue files by uploading samples to Dr. Web Ransomware Decryption Service. Analyzing files will be performed free of charge and if files are decryptable, all you need to do is purchase a 2-year license of Dr.Web Security Space worth $120 or less. Otherwise, you don’t have to pay.
If you are infected with BLUE LOCKER Ransomware and removed from your computer you can try to decrypt your files. Antivirus vendors and individuals create free decryptors for some crypto-lockers. To attempt to decrypt them manually you can do the following:
Use Stellar Data Recovery Professional to restore .blue files
- Download Stellar Data Recovery Professional.
- Click Recover Data button.
- Select type of files you want to restore and click Next button.
- Choose location where you would like to restore files from and click Scan button.
- Preview found files, choose ones you will restore and click Recover.
Using Windows Previous Versions option:
- Right-click on infected file and choose Properties.
- Select Previous Versions tab.
- Choose particular version of the file and click Copy.
- To restore the selected file and replace the existing one, click on the Restore button.
- In case there is no items in the list choose alternative method.
Using Shadow Explorer:
- Download Shadow Explorer program.
- Run it and you will see screen listing of all the drives and the dates that shadow copy was created.
- Select the drive and date that you want to restore from.
- Right-click on a folder name and select Export.
- In case there are no other dates in the list, choose alternative method.
If you are using Dropbox:
- Login to the DropBox website and go to the folder that contains encrypted files.
- Right-click on the encrypted file and select Previous Versions.
- Select the version of the file you wish to restore and click on the Restore button.
How to protect computer from viruses, like BLUE LOCKER Ransomware, in future
1. Get special anti-ransomware software
Use ZoneAlarm Anti-Ransomware
Famous antivirus brand ZoneAlarm by Check Point released a comprehensive tool, that will help you with active anti-ransomware protection, as an additional shield to your current protection. The tool provides Zero-Day protection against ransomware and allows you to recover files. ZoneAlarm Anti-Ransomware is compatible with all other antiviruses, firewalls, and security software except ZoneAlarm Extreme (already shipped with ZoneAlarm Anti-Ransomware) or Check Point Endpoint products. The killer features of this application are: automatic file recovery, overwrite protection that instantly and automatically recovers any encrypted files, file protection that detects and blocks even unknown encryptors.
2. Back up your files
As an additional way to save your files, we recommend online backup. Local storage, such as hard drives, SSDs, flash drives, or remote network storage can be instantly infected by the virus once plugged in or connected to. BLUE LOCKER Ransomware uses some techniques to exploit this. One of the best services and programs for easy automatic online backup is iDrive. It has the most profitable terms and a simple interface. You can read more about iDrive cloud backup and storage here.
3. Do not open spam e-mails and protect your mailbox
Malicious attachments to spam or phishing e-mails are the most popular method of ransomware distribution. Using spam filters and creating anti-spam rules is good practice. One of the world leaders in anti-spam protection is MailWasher Pro. It works with various desktop applications and provides a very high level of anti-spam protection.