iolo WW

Ransomware

Articles about removing Windows lockers, Browser lockers, Crypto-viruses and other types of blackmailing threats.

How to remove AvosLocker Ransomware and decrypt .avos files

0
AvosLocker is one of the most recent ransomware infections that encrypt personal files using both AES-256 and RSA-2048 algorithms. Along with this, the virus adds new .avos extension to each file that got encrypted. To illustrate, a sample file like 1.pdf will change to 1.pdf.avos and reset its original icon at the end of encryption. After all files have been configured with the new extension, users will see a text note called GET_YOUR_FILES_BACK.txt explaining how to recover the data. To do this, victims are instructed to visit the onion link via Tor browser, enter their personal ID, and therefore get the price for decryption suite to return their data. For now, this looks to be the only option available to recover your data completely. There is no third-party tool that has been successfully tested in decrypting AvosLocker files. It is worth noting that paying the monetary ransom may bear the risk of losing your money as well. This is why the best-case scenario in this situation is using backup copies of data.

How to remove Gru Ransomware and decrypt .gru files

0
Gru Ransomware blocks access to personal data to earn money on demanding a so-called ransom. Such malware runs file encryption with strong algorithms that prevent users from approaching free decryption. The virus adds the .gru extension to each encrypted file. To illustrate, 1.pdf or any other similar file will change to 1.pdf.gru and reset its original icon. Such changes will be applied to most types of data stored on your system. To regain access to your data, victims are asked to follow instructions outlined inside of the read_it.txt text note, which is created after encryption. Cybercriminals state there is no way to decipher your data without buying special software. The price of such software is established at 1,500$ to be paid in BTC. The payment address can be found at the very bottom of the text note. Unlike other ransomware programs, Gru developers do not ask their victims to establish any sort of contact with them (by e-mail or Tor link). Therefore, It is uncertain how are they going to send you the decryption software once you deliver the money. Thus, trusting Gru Ransomware in terms of paying the ransom is quite a huge risk. Even though its developers might be the only figures able to decrypt your entire data, we recommend against sending your money.

How to remove the Vn_os Ransomware and decrypt .vn_os files

0
Vn_os is a ransomware-type virus that encrypts personal data to demand money in exchange for the blocked files. Such virus type also assigns new file extensions. Vn_os makes sure all encrypted files are changed with the .vn_os extension. This is meant to visually separate encrypted from original files. For instance, 1.pdf and other files stored on your system will be changed to 1.pdf.vn_os, or similarly, right after encryption. As soon as this stage of infection is done, the virus displays a pop-up window with instructions on how to recover your data. The same can also be found inside of a text note called ___RECOVER__FILES__.vn_os.txt which is dropped into each folder containing infected data.

How to remove Babuck Locker Ransomware and decrypt .babyk or .babuk files

0
Discovered by a malware researcher named Glacius_, Babuk Locker (a.k.a. Vasa Locker, Babyk Locker, Babuk Locker) is a ransomware-type virus that targets commercial organizations including business ventures with turnovers equal to 4.000.000$. All because it demands a ransom of 60000-85000$ in BTC to be paid in exchange for the encrypted data. To make sure their victims are unable to decrypt them independently, cybercriminals use a combination of SHA252, ChaCha8, and ECDH algorithms to run secure encryption. Babuk Locker developers run extensive distribution campaigns to cover as many victims as possible. This is why users are also likely to witness other versions derived from Babuk Locker (e.g. Babyk, Vasa, etc). Depending on which version attacked the compromised network, victims will see different extensions applied to encrypted files. Normally, it is .__NIST_K571__; .babyk, or .babuk assigned to each data piece. For instance, a file like 1.pdf stored on a malware-affected device, will change its look to 1.pdf.__NIST_K571__, 1.pdf.babyk, or 1.pdf.babuk at the end of encryption. Then, as soon as this stage of infection is done, the virus creates a text note called "How To Restore Your Files.txt" to each folder with encrypted data.

How to remove Neflim Ransomware and decrypt .neflim or .f1 files

0
Neflim is a ransomware infection that encrypts data stored on the compromised devices. By doing so, cybercriminals have a good occasion to blackmail users into paying the so-called ransom. There are two forms of the Neflim virus known at the moment. First appends the .neflim extension, whilst another uses .f1 to rename the encrypted data. Some experts tend to classify these versions as separate ransomware infections, yet they are both parts of the common family. To illustrate how encrypted files are changed, let's take a look at the original 1.pdf data piece. At the end of encryption, it will change either to 1.pdf.neflim or 1.pdf.f1 depending on which versions captured your data. The same encryption pattern will be applied to the rest of the files stored on your device. As soon as all of the data appears under the lock of swindlers, victims have to read instructions on recovering data inside of the NEFLIM-DECRYPT.txt or f1-HELP.txt notes.

How to remove Hive Ransomware and decrypt .hive files

0
Hive is a malicious program classified as ransomware. Its main purpose lies in running file encryption to blackmail users into paying the ransom. This ransom is a certain amount required in exchange for the blocked data. Users can spot that their files have been encrypted by the change of their names. Specifically, victims are seeing a random string of characters along with the .hive extension assigned to each data piece. Such a change makes files encrypted, which declines access to them. To recover the lost access to data, users are instructed to follow the details stated inside of a text note called HOW_TO_DECRYPT.txt. Cybercriminals inform the affected victims that their network has been hijacked, which led to immediate data encryption. To decrypt the compromised files, victims have to contact extortionists via the link attached to the note and purchase the decryption software. The last thing written by cybercriminals is how to avoid irreversible data damage. They say it is forbidden to run any manipulations with your data, e.g. do not shut your PC intentionally, modify or change file names, use third-party software, and many other attempts to erase the encryption.

How to remove Poliex Ransomware and decrypt .poliex files

0
Poliex is a ransomware-type virus discovered by a malware hunter from South Korea known as dnwls0719. Likewise other infections of such type, Poliex does encrypt personal data to blackmail users into paying the ransom. Along with encrypting files by military-grade algorithms, the virus also appends the .poliex extension to each of the compromised pieces. To illustrate, a file named 1.pdf will experience a change to 1.pdf.poliex and drops its original icon at the end of encryption. Once such changes have been successfully applied, users will lose access to their data. Instructions on how to return it are stated inside of the README.txt note, which is created after encryption is done. There is not too much written by the developers, yet it is enough to understand what victims should do. As cybercriminals say, the decryption price is 500$. Right after this message extortionists attach their telegram address. To get involved in further conversations with swindlers, users should contact the frauds using the Telegram app. After establishing contact with them, victims will therefore get the necessary payment details to transfer the required amount of money. Unfortunately, there is little data on how cybercriminals behave themselves during private chat. They can offer to test free decryption of some files to elevate the trust of victims who hesitate on their trustworthiness.

How to remove 0xxx Ransomware and decrypt .0xxx files

0
0xxx is a ransomware infection that encrypts various data using AES+RSA algorithms on NAS devices (Western Digital My Book). This measure is done to force victims into paying the so-called ransom in exchange for the blocked data. Just like other malware of this type, 0xxx uses its own extension (.0xxx) to rename the data. For example, a file piece titled as 1.pdf will change its look to 1.pdf.0xxx after encryption. All of these changes indicate that your data is no longer accessible. In other words, there is no way to open it anymore. In order to fix it, victims are called into following ransom instructions inside of the !0XXX_DECRYPTION_README.TXT text note. This note is dropped into each folder containing encrypted files. It is said that victims can decrypt their data by paying a 300 USD ransom in Bitcoin. At first, users are instructed to contact cyber criminals via e-mail. It is necessary to include your unique ID along with 3 files to test free decryption. As soon as contact with cybercriminals becomes established, victims will get the payment details to perform a transfer of money. Although extortionists claim they have no intention to fool you, there have been multiple cases when users did not receive the decryption tools even after the payment.