iolo WW

Tutorials

Useful tutorials on various PC troubleshooting topics. Video tutorials.

How to remove AttackSystem Ransomware and decrypt .attacksystem files

0
AttackSystem is a ransomware infection that has file-encrypting capabilities. This means that after getting infected by it victims will be restricted from accessing their own data until a ransom payment is made. In addition, the ransomware also alters the file appearance by adding the .attacksystem extension. For instance, a file previously named 1.pdf will change to something like 1.pdf.attacksystem and become no longer usable. Information on how to return the blocked data provided by swindlers in the How_to_back_files.html file that gets created after encryption. It is also worth noting that AttackSystem Ransomware has been discovered to belong to another malware family known as MedusaLocker.

How to fix Zoom error code 10004 on Windows 11

0
Some users can be presented with error code 10004 while launching, installing the Zoom app, or even trying to attend a call session. This problem is known to occur when Zoom fails to establish a proper connection with its servers and perform an automatic update. The most common causes for this are usually unstable internet connection, interference by third-party software, temporary issues on Zoom servers, corrupted Zoom files, and even blockage by Windows Defender Firewall (or third-party firewall). By following our guide below, you will be able to approach this error step-by-step and resolve it with one of the methods eventually. Please note that our instructions are initially based on Windows 11, however, most of them look almost identical on earlier Windows versions as well.

How to remove Saba Ransomware and decrypt .saba files

0
Saba is a ransomware program belonging to the STOP/Djvu malware family. Alike previous ransomware versions released by this family, Saba encrypts personal data and demands victims to pay a ransom for its return. During this process, the virus modifies all restricted files using the .saba extension. For instance, a file named 1.pdf will change to 1.pdf.saba and reset its original icon. Following this, Saba Ransomware creates a text note (_readme.txt) containing instructions on how to recover the files. As said in the note, victims should contact ransomware developers via e-mail communication (support@freshmail.top or datarestorehelp@airmail.cc) and pay 980 dollars for special decryption software. Cybercriminals also offer a 50% discount off the mentioned price if victims write a message to swindlers within 72 hours. In addition to this, infected users are also allowed to send 1 encrypted file to get it unlocked and fully working for free. Whether it is possible to decrypt your data without paying the ransom depends on how it was encrypted. Developers from the STOP family may use both offline and online ways of generating and storing assigned ciphers.

How to fix Roblox error code 264 on Windows 11

0
Error code 264 is a pretty widespread issue that some players tend to experience while trying to launch Roblox on Windows 11 or earlier Windows editions. Here are the two most common messages that users often see on their screens: "Same account launched game from different device. Reconnect if you prefer to use this device. (Error Code: 264)." or "You are already playing a game. Please shut down the other game and try again (Error Code: 264).". As a rule, this error appears when players are logged into their Roblox account on multiple devices. To solve this problem, it is frequently enough to simply log out of your Roblox account on another device. In addition, poor network connection, corrupted cache, and even outdated Roblox versions could be the cause of the problem as well. Below we will show you a couple of methods that, with high probability, will fix the error. Try each presented solution until one of them eventually resolves the error code 264 and lets you play Roblox again.

How to remove Sato Ransomware and decrypt .sato files

0
Sato Ransomware is a computer virus-extortioner, with a global impact, that belongs to the largest family of STOP/Djvu Ransomware. It was developed by cyber-racketeers to blackmail users worldwide. Malware blocks access to users' documents, photos, databases, music, mail, archives by encrypting them with an AES encryption algorithm and demands ransom: from $490 to $980 in Bitcoins. The modification of the virus, that we are investigating now adds .sato extensions to affected files and has many other characteristic signs. It appeared in the end of April - beginning of May. For example, all latest versions of STOP Ransomware use _readme.txt ransom note file with typical message. The particular version, under research today, uses the following e-mail addresses: support@freshmail.top and datarestorehelp@airmail.cc.

How to stop “Reconfirm Shipping Documents” e-mail spam

0
An e-mail message that tries to convince recipients that they need to "Reconfirm Shipping Documents" is likely a phishing letter that should be avoided and not interacted with. Note that such spam campaigns can send phishing messages with varying content and deceiving techniques. However, the one that got under our examination showed "SWIFT PAYMENT" in the subject line and urged victims into opening two attached HTML files (PAYMENT SLIP.HTML and PAYMENT SLIP2.HTML). After opening, both attachments required users to enter their credentials (often e-mails & passwords) for alleged confirmation purposes. Please note that all the claimed information in this message is fake and the attachments are phishing. This means they are capable of recording the data upon its input without the consent of users. If entered credentials are correct, they can therefore be abused for accessing related accounts (such as in social media). As a result, cybercriminals can exploit the accessed accounts to scam other people or distribute malicious links/files. Apart from the "Reconfirm Shipping Documents" e-mail spam, a plethora of other spam campaigns exist on the web. While some of them are designed to steal personal information (e.g., credit card details, e-mails, passwords, etc.), others can spread malicious attachments that install a virus (like ransomware). Never trust suspiciously-looking messages, and do not download files from shady and unknown senders. If you become a victim of "Reconfirm Shipping Documents" e-mail spam, make sure to change your login credentials and scan your system with an anti-malware tool from our guide below. Read our guide below to learn how to keep your e-mail protected and spam-free.

How to remove SethLocker Ransomware and decrypt your files

0
SethLocker is a recently-discovered ransomware infection. Cybercriminals use it to run encryption of potentially important files and then urge victims into paying money for their decryption. As opposed to many other similar infections that add their own extension to the end of filenames, SethLocker does run any visual alterations and leaves all files and icons in their original look. Despite this, the data is nonetheless encrypted and victims are prevented from accessing it. To return the blocked data, threat actors have written instructions in a text note called HOW_DECRYPT_FILES.txt. It says all essential files have been encrypted due to a vulnerability within the system. In order to redo the malicious changes, victims are obliged to contact the swindlers via one of their e-mail addresses and pay money for decryption. The price for decryption is not disclosed in the message, however, cybercriminals claim it to be "too small". In addition, victims are also allowed to send one non-valuable file and get it decrypted for free. This way cyber-crooks show their ability to decrypt the files and additionally give extra motivation for paying the ransom. Note that paying the ransom is usually not recommended since some extortionists fool their victims and do not send any decryption tools after the payment.

How to remove DVN Ransomware and decrypt .devinn files

0
DVN is a ransomware infection that runs strong encryption to hostage potentially important files until a ransom is paid. In addition to encryption, the virus also assigns the .devinn extension to highlight the blocked data; changes the desktop wallpapers; and create the unlock_here.txt text note with recovery instructions. Cybercriminals say they will provide the necessary decryption software only if victims pay 0.0077 BTC (around $200). It is stated the payment can be done only in Bitcoin and to the attached crypto address. Unlike many other ransomware infections, developers behind DVN Ransomware do not include any means of communication with them (e.g., e-mail, various messengers, etc.). Thus, it is very unclear how victims will communicate with the attackers in order to receive the promised decryption tool after making the payment. Paying the ransom is highly not recommended since there is a risk of not getting anything in return. Unfortunately, we have to note that cybercriminals are usually the only figures actually capable of fully decrypting access to data.