malwarebytes banner

Ransomware

Articles about removing Windows lockers, Browser lockers, Crypto-viruses and other types of blackmailing threats.

How to remove Blackoutware Ransomware and decrypt .blo files

0
Blackoutware is a type of ransomware, a malicious software designed to encrypt data and demand ransoms for its decryption. This article will provide a comprehensive understanding of Blackoutware Ransomware, its infection methods, the file extensions it adds, the encryption it uses, the ransom note it creates, and the potential decryption tools available. Blackoutware Ransomware is a crypto virus that encrypts files on a victim's computer and appends their filenames with a .blo extension. For instance, a file initially titled 1.jpg would appear as 1.jpg.blo. After the encryption process, a ransom note titled !!!WARNING!!!.txt is dropped into the C:\Users[username] folder. The ransom note states that the victim's files have been encrypted and that decryption requires payment. The ransom is typically demanded in cryptocurrencies, such as Litecoin (LTC) or Bitcoin (BTC), with the amount often listed as 5000 euros. The victim is usually given 72 hours to comply, and the note warns against modifying the encrypted files or using third-party decryption tools, as this could result in permanent data loss.

How to remove Gyza Ransomware and decrypt .gyza files

0
Gyza Ransomware is a malicious software that belongs to the STOP/Djvu ransomware family. It targets various file types, encrypts them, and appends the .gyza extension to the encrypted files, rendering them inaccessible. After encryption, Gyza delivers a ransom note (_readme.txt) instructing victims to pay a ransom to obtain a decryption tool and a unique key to restore access to their files. The ransomware uses the Salsa20 encryption algorithm to encrypt files. The ransom note instructs victims to contact the cybercriminals via support@freshmail.top or datarestorehelp@airmail.cc email addresses. The ransom amount ranges from $490 to $980, payable in Bitcoin.

How to remove Gycc Ransomware and decrypt .gycc files

0
Gycc is a strain of ransomware that is linked to the Djvu malware family. This malicious software is designed to encrypt files on a victim's computer, rendering them inaccessible. The encrypted files are appended with the .gycc extension. For instance, a file originally named 1.jpg would be renamed to 1.jpg.gycc. Ransomware typically uses strong encryption algorithms, such as RSA or AES, to lock victims' files. Once encrypted, the files can only be unlocked by a decryption key known only to the attacker. After encrypting the files, Gycc ransomware leaves a ransom note named _readme.txt. This note informs the victim that their files have been encrypted and provides instructions on how to contact the attackers. The victims are usually asked to contact the malware developers via specific email addresses. The ransom demanded can range from $490 to $980, typically in Bitcoin cryptocurrency.

How to remove Danger Siker Ransomware and decrypt .DangerSiker files

0
Danger Siker Ransomware is a type of malware that encrypts files on a victim's computer, making them inaccessible. It appends the .DangerSiker extension to filenames (e.g., 1.jpg becomes 1.jpg.DangerSiker). The ransomware changes the desktop wallpaper and creates a ransom note named mesajin_var_amcik.txt in Turkish, demanding a payment of 0.5 XMR (Monero cryptocurrency) for file decryption. The ransom note instructs the victim not to attempt file recovery independently, as it could worsen the situation. Once the payment is made, the victim is directed to send an email to mesaezzoris@gmail.com. Below is a sample of the ransom-demanding message.

How to remove Shanova Ransomware and decrypt .shanova files

0
Shanova Ransomware is a malicious program based on the Chaos Ransomware. It operates by encrypting data on a victim's computer and demanding payment for its decryption. The ransomware appends the .shanova extension to the filenames of encrypted files. For instance, a file originally titled 1.jpg would appear as 1.jpg.shanova. The specific encryption algorithm used by Shanova ransomware is not yet determined, but ransomware typically uses symmetric or asymmetric cryptographic algorithms. After encrypting files, Shanova ransomware creates a ransom note titled read_it.txt. The note informs the victim that their files have been encrypted and that decryption will require a ransom payment. The note also warns against attempting to modify or repair the locked files, as this could render them undecryptable.

How to remove Iicc Ransomware and decrypt .iicc files

0
Iicc Ransomware is a variant of the notorious STOP/DJVU ransomware family. It is a file-encrypting ransomware infection that restricts access to data such as documents, images, and videos by encrypting files and appending the .iicc extension to them. The ransomware then attempts to extort money from victims by asking for a ransom, typically in the form of Bitcoin cryptocurrency, in exchange for access to the encrypted data. Once the Iicc Ransomware infects a computer, it scans for images, videos, and important productivity documents and files such as .doc, .docx, .xls, .pdf. When these files are detected, the ransomware encrypts them using the Salsa20 encryption algorithm. After the encryption process, the ransomware drops a ransom note named _readme.txt on the desktop. The ransom note contains instructions on how to contact the authors of this ransomware via the support@freshmail.top and datarestorehelp@airmail.cc email addresses. The ransom demanded ranges from $490 to $980 in Bitcoins.

How to remove Eqew Ransomware and decrypt .eqew files

0
Eqew Ransomware is a malicious software that belongs to the Djvu/STOP family. Its primary purpose is to encrypt files on the victim's computer and demand a ransom for their decryption. The ransomware appends the .eqew extension to filenames, making them inaccessible without a unique decryption key. Once installed, Eqew ransomware establishes a connection with its command and control server, controlled by the attackers. It then encrypts files using a strong encryption algorithm and a unique key, either an 'offline key' or an 'online key'. After the encryption process, Eqew ransomware creates a ransom note named _readme.txt in every folder containing encrypted files. The ransom note states that files have been encrypted and can only be decrypted by purchasing a decryption tool and a unique key. The cost of acquiring the private key and decryption software is $980, but there is a 50% discount if victims contact the attackers within the first 72 hours, lowering the price to $490. Victims can communicate with the cybercriminals via the provided email addresses: support@freshmail.top and datarestorehelp@airmail.cc.

How to remove Pig865qq Ransomware and decrypt .Pig865qq files

0
Pig865qq Ransomware is a type of virus, a malicious software that encrypts files on a victim's computer and demands a ransom for their decryption. It is a variant associated with the GlobeImposter family of ransomware. Once the ransomware infects a computer, it encrypts files and appends the .Pig865qq extension to them. For example, it changes 1.jpg to 1.jpg.Pig865qq, 2.png to 2.png.Pig865qq, and so forth. The encryption used by Pig865qq is robust, making it highly difficult to decrypt files without the necessary decryption tools, which are typically held by the attackers. Pig865qq creates a ransom note titled HOW TO BACK YOUR FILES.exe. The note informs the victim that their files have been encrypted and provides instructions for decryption. It directs the individual to contact the specified email address, china.helper@aol.com, and send one encrypted test image, text file, or document along with their personal ID. The note emphasizes the exclusivity of the attackers for decryption services, warning against contacting other services as potential fraud. It also discourages attempts at self-decrypting files, asserting potential data loss.