malwarebytes banner

Ransomware

Articles about removing Windows lockers, Browser lockers, Crypto-viruses and other types of blackmailing threats.

How to remove Coba Ransomware and decrypt .coba files

0
Being a successor of Djvu Ransomware, Coba is a ransomware-type virus that targets personal data. Just like other malware of this type, Coba runs data encryption to demand monetary ransom from victims. All files attacked by Coba (including pictures, databases, documents, etc.) will be restricted from access and altered visually as well. For example, a file like 1.pdf will change its look to 1.pdf.coba at the end of encryption. Developers of this ransomware variant apply the .coba extension to each of the target files stored on a system. The next thing it does after manipulating data extensions creates a ransom note (_readme.txt) that contains decryption instructions. Once users open it up, they will be presented with text written by cybercriminals. This text provides information on how to return the encrypted data.

How to remove SkullLocker Ransomware and decrypt .skull files

0
SkullLocker is a new ransomware variant. The research indicates it was developed on the basis of Chaos Ransomware – another devastating and well-known infection. Upon successful infiltration, SkullLocker encrypts access to files, adds its own .skull extension, and creates a ransom note (read_it.txt) with decryption instructions written in the Polish language. Here is a full text presented in the note along with its translation to English. Overall, cybercriminals demand users make a payment within 72 hours, otherwise, the data will be permanently lost. Users are asked to familiarize themselves with payment and recovery details via the attached TOR link. In addition, the note advises against trying to recover files manually as doing so may cause permanent damage to files.

How to remove Coaq Ransomware and decrypt .coaq files

0
Coaq Ransomware is the subtype of STOP Ransomware (or DJVU Ransomware) and has all the characteristics of this family of viruses. Malware blocks access to the data on the victim's computers by encrypting it with the AES encryption algorithm. STOP Ransomware is one of the longest living ransomware. First infections were registered in December 2017. Coaq Ransomware with such suffix is yet another generation of it and appends .coaq extensions to encrypted files. Following the encryption, the malware creates a ransom note file: _readme.txt on the desktop and in the folders with encoded files. In this file, hackers provide information about decryption and contact details, such as e-mails: support@freshmail.top and datarestorehelp@airmail.cc.

How to remove Cosw Ransomware and decrypt .cosw files

1
New instances of STOP Ransomware (DjVu Ransomware) continue to damage users files all over the world. STOP/Djvu Ransomware is a specific type of ransomware that has been active since 2017. It is a type of file-encrypting malware that encrypts victims' files and demands payment in exchange for the decryption key. This crypto-virus uses a complex AES encryption algorithm to block users' access to their data and extort a ransom of $490 or $980. One of the new variations of extension, that appeared in October 2022, is: .cosw. Corresponding ransomware got the name Cosw Ransomware. The virus adds such suffixes to the end of encrypted files. If your files got such an ending and are not accessible, it means your PC is infected with STOP Ransomware. Malware developers slightly modify the virus technically.

How to remove Goba Ransomware and decrypt .goba files

1
Goba Ransomware, which is actually next generation of STOP Ransomware appeared in the beginning of March 2023. This virus encrypts users' essential files, such as documents, photos, databases, music with AES encryption and adds .goba extensions to affected files. This ransomware is almost identical to numerous previous versions of the malware, that we described earlier, and belongs to the same authors, and uses the same e-mail addresses (support@freshmail.top and datarestorehelp@airmail.cc) and the same Bitcoin wallets. Full decryption is almost impossible, however, partially your data can be restored using instructions in this article. After the virus finishes, it creates _readme.txt file with the ransom note on the desktop and in the folders with affected files.

How to remove WannaSmile Ransomware and decrypt .wannasmile files

0
If your files have been suddenly altered with the .wannasmile extension (for example, 1.pdf.wannasmile) and you are now shown a ransom-demanding message in the pop-up window, then you are likely dealing with WannaSmile Ransomware. Although there is not enough justification for this, WannaSmile could be a new version of another identically named ransomware from 2017 (by Iranian developers), which assigned the .WSmile extension. In general, such malware is typically designed to render data inaccessible (by running encryption) and then extort money from victims for its decryption.

How to remove Goaq Ransomware and decrypt .goaq files

0
Developed by the Djvu family, Goaq Ransomware is a malicious program that runs extensive encryption of personal data. It uses popular, yet strong algorithms to put the stored files under severe lock. This, therefore, prevents users from succeeding in manual decryption. Knowing that users will not be able to recover files on their own, cybercriminals offer to decrypt data using their tools for a certain amount of money. The details that are presented inside a text note called _readme.txt, which is created after Goaq assigns new extensions to data. Specifically, it adds the .goaq extension so that encrypted files would look something like this 1.pdf.goaq. As soon as such changes are done, users will be no longer eligible to access their data.

How to remove Gosw Ransomware and decrypt .gosw files

1
This article contains information about Gosw Ransomware version of STOP Ransomware that adds .gosw extensions to encrypted files, and creates ransom note files on the desktop and in the folders with affected files. Unfortunately, the encryption algorithm of this ransomware is currently unbreakable, but there are small chances to restore your files, that we describe in this text. Gosw Ransomware is actively distributed in the following countries: USA, Canada, Spain, Mexico, Turkey, Egypt, Brazil, Chile, Ecuador, Venezuela, Germany, Poland, Hungary, Indonesia, Thailand. This variation first appeared in the beginning of March 2023 and is almost identical to the previous dozens of variations. Ransomware virus still uses AES encryption algorithm and still demands a ransom in Bitcoin for decryption.