What is Kekware Ransomware

Kekware is a recent ransomware-type virus. The main symptom of this infection successfully breaching the system is strong encryption of data. As a result, users will no longer be able to access or modify files as they used to do previously. Victims will also see a change in how their data appears – all encrypted samples get renamed according to the following pattern – [random_string].[original_extension][random_string].cyn. To illustrate, a file like 1.pdf may change to something like 7462.jpg7088.cyn and reset its original icon as well. After this part of encryption is done, the virus creates a file called YcynNote.txt, which holds decryption instructions.

YcynNote.txt

Q: What happened to my files?
A: They got encrypted by kekware.
Q: how can i get them back?
A: You can get them back by paying $500 in bitcoin to this btc wallet bc1qrl532s9r2qge8d8p7qlrq57dc4uhssqjexmlwf.
Q: What happens if i dont pay?
A: You will never get your files back.

As said within the note, victims ought to pay a ransom of $500 in bitcoin to the attached cryptocurrency wallet. If victims decide to not follow the demands, cybercriminals say no decryption of data will ever be possible without their involvement. Unfortunately, at the moment of writing this article, this claim should indeed be taken quite seriously. If you do not have backup copies of data saved on external storage devices, you will have a bare chance to decrypt the Kekware data using third-party tools. You can try some in our tutorial below, however, we cannot guarantee that they will be able to help. As an alternative, the encrypted data can be saved and held until a possible release of working third-party tools or updates to the existing. Many ransomware infections generate online keys, which are almost impossible to decipher without the cybercriminals’ help. Note that before trying any recovery methods, be it a transfer of backup copies or third-part decryption, important is to delete the infection from your computer. Otherwise, it will continue its malicious activity or even breach other PCs working within the same network. Instruction on both removal and restoration methods can be found in the tutorial below.

kekware ransomware

How Kekware Ransomware infected your computer

Many cybercriminals lean on deceptive and phishing techniques to distribute various kinds of malware. It can happen via malicious files (DOCX, PDF, EXE, RAR, ZIP, JS, etc.) or links delivered through e-mail spam letters. Such letters can be disguised as something important or urgent forcing users to act upon various reasons written within. For instance, there are fake messages being delivered by ostensibly real DHL, FedEx, Netflix, or other companies claiming your delivery receipt is ready or that your subscription is about to expire. Whatever it is, receiving such letters without having any relatedness to the sender’s address most likely means they are malicious and therefore – dangerous. Another way of distributing viruses including ransomware is via fake updates or program installers. Cybercriminals may distribute them on torrent pages or one-page websites embedded with dubious ads. Be careful downloading such content and try to avoid using it at all. Even now there are various types of subscriptions like “Xbox Game Pass” allowing people to access a ton of paid games for only a couple of dollars a month.

  1. Download Kekware Ransomware Removal Tool
  2. Get decryption tool for .cyn files
  3. Recover encrypted files with Stellar Data Recovery Professional
  4. Restore encrypted files with Windows Previous Versions
  5. Restore files with Shadow Explorer
  6. How to protect from threats like Kekware Ransomware

Download Removal Tool

Download Removal Tool

To remove Kekware Ransomware completely, we recommend you to use WiperSoft AntiSpyware from WiperSoft. It detects and removes all files, folders, and registry keys of Kekware Ransomware and prevents future infections by similar viruses.

Alternative Removal Tool

Download SpyHunter 5

To remove Kekware Ransomware completely, we recommend you to use SpyHunter 5 from EnigmaSoft Limited. It detects and removes all files, folders, and registry keys of Kekware Ransomware. The trial version of SpyHunter 5 offers virus scan and 1-time removal for FREE.

Kekware Ransomware files:


YcynNote.txt
{randomname}.exe

Kekware Ransomware registry keys:

no information

How to decrypt and restore .cyn files

Use automated decryptors

Download Kaspersky RakhniDecryptor

kaspersky dharma ransomware decryptor

Use following tool from Kaspersky called Rakhni Decryptor, that can decrypt .cyn files. Download it here:

Download RakhniDecryptor

There is no purpose to pay the ransom because there is no guarantee you will receive the key, but you will put your bank credentials at risk.

Dr.Web Rescue Pack

Famous antivirus vendor Dr. Web provides free decryption service for the owners of its products: Dr.Web Security Space or Dr.Web Enterprise Security Suite. Other users can ask for help in the decryption of .cyn files by uploading samples to Dr. Web Ransomware Decryption Service. Analyzing files will be performed free of charge and if files are decryptable, all you need to do is purchase a 2-year license of Dr.Web Security Space worth $120 or less. Otherwise, you don’t have to pay.

If you are infected with Kekware Ransomware and removed from your computer you can try to decrypt your files. Antivirus vendors and individuals create free decryptors for some crypto-lockers. To attempt to decrypt them manually you can do the following:

Use Stellar Data Recovery Professional to restore .cyn files

stellar data recovery professional

  1. Download Stellar Data Recovery Professional.
  2. Click Recover Data button.
  3. Select type of files you want to restore and click Next button.
  4. Choose location where you would like to restore files from and click Scan button.
  5. Preview found files, choose ones you will restore and click Recover.
Download Stellar Data Recovery Professional

Using Windows Previous Versions option:

  1. Right-click on infected file and choose Properties.
  2. Select Previous Versions tab.
  3. Choose particular version of the file and click Copy.
  4. To restore the selected file and replace the existing one, click on the Restore button.
  5. In case there is no items in the list choose alternative method.

Using Shadow Explorer:

  1. Download Shadow Explorer program.
  2. Run it and you will see screen listing of all the drives and the dates that shadow copy was created.
  3. Select the drive and date that you want to restore from.
  4. Right-click on a folder name and select Export.
  5. In case there are no other dates in the list, choose alternative method.

If you are using Dropbox:

  1. Login to the DropBox website and go to the folder that contains encrypted files.
  2. Right-click on the encrypted file and select Previous Versions.
  3. Select the version of the file you wish to restore and click on the Restore button.

How to protect computer from viruses, like Kekware Ransomware, in future

1. Get special anti-ransomware software

Use ZoneAlarm Anti-Ransomware

Famous antivirus brand ZoneAlarm by Check Point released a comprehensive tool, that will help you with active anti-ransomware protection, as an additional shield to your current protection. The tool provides Zero-Day protection against ransomware and allows you to recover files. ZoneAlarm Anti-Ransomware is compatible with all other antiviruses, firewalls, and security software except ZoneAlarm Extreme (already shipped with ZoneAlarm Anti-Ransomware) or Check Point Endpoint products. The killer features of this application are: automatic file recovery, overwrite protection that instantly and automatically recovers any encrypted files, file protection that detects and blocks even unknown encryptors.

Download ZoneAlarm Anti-Ransomware

2. Back up your files

idrive backup

As an additional way to save your files, we recommend online backup. Local storage, such as hard drives, SSDs, flash drives, or remote network storage can be instantly infected by the virus once plugged in or connected to. Kekware Ransomware uses some techniques to exploit this. One of the best services and programs for easy automatic online backup is iDrive. It has the most profitable terms and a simple interface. You can read more about iDrive cloud backup and storage here.

3. Do not open spam e-mails and protect your mailbox

mailwasher pro

Malicious attachments to spam or phishing e-mails are the most popular method of ransomware distribution. Using spam filters and creating anti-spam rules is good practice. One of the world leaders in anti-spam protection is MailWasher Pro. It works with various desktop applications and provides a very high level of anti-spam protection.

Download MailWasher Pro
Previous articleHow to remove NOKOYAWA Ransomware and decrypt .NOKOYAWA files
Next articleHow to remove Dfwe Ransomware and decrypt .dfwe files