What is Checkmate Ransomware

Checkmate is a new ransomware infection that encrypts large volumes of office data and demands victims to pay 15,000 USD for its decryption. The virus uses secure algorithms to encipher important pieces of data (e.g., documents, tables, databases, photos, etc.). During this process, all affected files get visually changed with the .checkmate extension. For instance, a file named 1.xlsx will change to 1.xlsx.checkmate and reset its original icon to blank. As a result, the data will become no longer accessible. Lastly, developers create a text note called !CHECKMATE_DECRYPTION_README.txt to explain how files can be decrypted.

!CHECKMATE_DECRYPTION_README.txt
.........
You was hacked by CHECKMATE team.
All your data has been encrypted, backups have been deleted.
Your unique ID: bc75c72[edited] You can restore the data by paying us money.
We have encrypted 267183 office files.
We determine the amount of the ransom from the number of encrypted office files.
The cost of decryption is 15000 USD.
Payment is made to a unique bitcoin wallet.
Before paying, you will be able to make sure that we can actually decrypt your files.
For this:
1) Download and install Telegram Messenger https://telegram.org/
2) Find us https://t.me/checkmate_team
3) Send a message with your unique ID and 3 files for test decryption. Files should be no more than 15mb each.
4) In response, we will send the decrypted files and a bitcoin wallet for payment. Bitcoin wallet is unique for you, so we can find out what you paid.
5) After the payment is received, we will send you the key and the decryption program.
...........

The text note states how many files have been encrypted and what can be done to reclaim them. As mentioned above, extortionists require victims to pay an equivalent of 15,000 USD in Bitcoin to their crypto wallet address. Additionally, swindlers also offer to try free decryption – by sending 3 encrypted files (no more than 15MB each) through the Telegram Messenger. They will afterwards supply the victim with free decrypted samples and provide the wallet address for the ransom payment. After transferring money, cybercriminals promise to respond back with decryption tools to unlock access to data. Unfortunately, at the moment of writing this article, there are no third-party tools that could allow free decryption without the direct help of cybercriminals. Means of encryption used by ransomware are usually very strong making independent tools oftentimes useless with regard to decryption. The good news is only about media-type files, which can be partially decrypted using the JpegMedic Arwe and Media Repair tools. For this, victims will need to have both encrypted and original (unencrypted) file samples to perform the method. You can read this article to learn more information about it. Readers of this guide can also use some recovery and decryption instruments presented below, however, there is no guarantee that they will actually work. It can be possible to capitalize on third-party tools in case a ransomware infection did not succeed in what it was intended to do (e.g., delete all shadow copy snapshots, add an extension but fail to encrypt files, not fully encrypt large-size files, and so forth). Unfortunately, such errors rarely happen. You can also save the encrypted files and wait for a possible solution to be released in the future. For now, the best option to get over decryption problems is to recover files from backup copies. If such copies are available on some other uninfected device, you can easily use them to regain the lost data. Note that before trying any recovery method, it is important to get rid of the infection. Use our guide to perform full and trace-free deletion of Checkmate Ransomware from your computer.

checkmate ransomware

How Checkmate Ransomware infected your computer

Victims reported that Checkmate Ransomware infects QNAP NAS, which is a Network Attached Storage device used by various firms to store large amounts of data. The infection may occur due to system vulnerabilities or other complementary infections. For instance, cybercriminals can spread their software through trojans or e-mail malicious attachments. The attachments are usually disguised as legitimate files (Word, Excel, PDF, EXE, JavaScript, RAR, ZIP, etc.) which were actually modified to contain infections. Malware developers make their best to bait users into downloading or opening the files – for instance, by saying this is “important” or “urgent”. Do not trust such requirements and never execute them as it may otherwise lead to the installation of malware. Unfortunately, when it comes to business and therefore extensive responsibility ends, it may be hard to control everything done by your workers and staff. This is why it is always a good idea to create regular backups of data and have them ready in case ransomware infiltrations occur. You can also read our guide below to learn some information about protecting yourself against future attacks of ransomware and its consequences such as encryption.

  1. Download Checkmate Ransomware Removal Tool
  2. Get decryption tool for .checkmate files
  3. Recover encrypted files with Stellar Data Recovery Professional
  4. Restore encrypted files with Windows Previous Versions
  5. Restore files with Shadow Explorer
  6. How to protect from threats like Checkmate Ransomware

Download Removal Tool

Download Removal Tool

To remove Checkmate Ransomware completely, we recommend you to use WiperSoft AntiSpyware from WiperSoft. It detects and removes all files, folders, and registry keys of Checkmate Ransomware and prevents future infections by similar viruses.

Alternative Removal Tool

Download SpyHunter 5

To remove Checkmate Ransomware completely, we recommend you to use SpyHunter 5 from EnigmaSoft Limited. It detects and removes all files, folders, and registry keys of Checkmate Ransomware . The trial version of SpyHunter 5 offers virus scan and 1-time removal for FREE.

Checkmate Ransomware files:


!CHECKMATE_DECRYPTION_README.txt
{randomname}.exe

Checkmate Ransomware registry keys:

no information

How to decrypt and restore .checkmate files

Use automated decryptors

Download Kaspersky RakhniDecryptor

kaspersky dharma ransomware decryptor

Use following tool from Kaspersky called Rakhni Decryptor, that can decrypt .checkmate files. Download it here:

Download RakhniDecryptor

There is no purpose to pay the ransom because there is no guarantee you will receive the key, but you will put your bank credentials at risk.

Dr.Web Rescue Pack

Famous antivirus vendor Dr. Web provides free decryption service for the owners of its products: Dr.Web Security Space or Dr.Web Enterprise Security Suite. Other users can ask for help in the decryption of .checkmate files by uploading samples to Dr. Web Ransomware Decryption Service. Analyzing files will be performed free of charge and if files are decryptable, all you need to do is purchase a 2-year license of Dr.Web Security Space worth $120 or less. Otherwise, you don’t have to pay.

If you are infected with Checkmate Ransomware and removed from your computer you can try to decrypt your files. Antivirus vendors and individuals create free decryptors for some crypto-lockers. To attempt to decrypt them manually you can do the following:

Use Stellar Data Recovery Professional to restore .checkmate files

stellar data recovery professional

  1. Download Stellar Data Recovery Professional.
  2. Click Recover Data button.
  3. Select type of files you want to restore and click Next button.
  4. Choose location where you would like to restore files from and click Scan button.
  5. Preview found files, choose ones you will restore and click Recover.
Download Stellar Data Recovery Professional

Using Windows Previous Versions option:

  1. Right-click on infected file and choose Properties.
  2. Select Previous Versions tab.
  3. Choose particular version of the file and click Copy.
  4. To restore the selected file and replace the existing one, click on the Restore button.
  5. In case there is no items in the list choose alternative method.

Using Shadow Explorer:

  1. Download Shadow Explorer program.
  2. Run it and you will see screen listing of all the drives and the dates that shadow copy was created.
  3. Select the drive and date that you want to restore from.
  4. Right-click on a folder name and select Export.
  5. In case there are no other dates in the list, choose alternative method.

If you are using Dropbox:

  1. Login to the DropBox website and go to the folder that contains encrypted files.
  2. Right-click on the encrypted file and select Previous Versions.
  3. Select the version of the file you wish to restore and click on the Restore button.

How to protect computer from viruses, like Checkmate Ransomware , in future

1. Get special anti-ransomware software

Use ZoneAlarm Anti-Ransomware

Famous antivirus brand ZoneAlarm by Check Point released a comprehensive tool, that will help you with active anti-ransomware protection, as an additional shield to your current protection. The tool provides Zero-Day protection against ransomware and allows you to recover files. ZoneAlarm Anti-Ransomware is compatible with all other antiviruses, firewalls, and security software except ZoneAlarm Extreme (already shipped with ZoneAlarm Anti-Ransomware) or Check Point Endpoint products. The killer features of this application are: automatic file recovery, overwrite protection that instantly and automatically recovers any encrypted files, file protection that detects and blocks even unknown encryptors.

Download ZoneAlarm Anti-Ransomware

2. Back up your files

idrive backup

As an additional way to save your files, we recommend online backup. Local storage, such as hard drives, SSDs, flash drives, or remote network storage can be instantly infected by the virus once plugged in or connected to. Checkmate Ransomware uses some techniques to exploit this. One of the best services and programs for easy automatic online backup is iDrive. It has the most profitable terms and a simple interface. You can read more about iDrive cloud backup and storage here.

3. Do not open spam e-mails and protect your mailbox

mailwasher pro

Malicious attachments to spam or phishing e-mails are the most popular method of ransomware distribution. Using spam filters and creating anti-spam rules is good practice. One of the world leaders in anti-spam protection is MailWasher Pro. It works with various desktop applications and provides a very high level of anti-spam protection.

Download MailWasher Pro
Previous articleHow to remove My Login Hub
Next articleHow to remove Adstomy.com