Hey you,
BE IN THE KNOW!

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:


Remove JohnyCryptor Ransomware and Restore Johnycryptor@aol.com Files

STF-johnycryptor-ransomware-johny-cryptor-aol-ransom-note-desktop

Another ransomware crypto-virus using an AOL email address has attacked unsuspecting users. The ransomware has been dubbed JohnyCryptor because that’s the name used for the email and correspondingly as the extension for encrypted files. The virus locks files and leaves the email with instructions how to contact the ransomware creators. The sum for ransom is not specified. To see how to remove the ransomware and how you could restore your files, you should read the article to the end.

Threat Summary

Name JohnyCryptor
Type Ransomware
Short Description The ransomware encrypts files with an extension ending in johnycryptor@aol.com and demands a ransom to be paid for decryption.
Symptoms The ransomware will encrypt files on your PC. A picture will appear with a message describing how to pay to get a decryptor.
Distribution Method Spam Emails, Email Attachments, Executable Files
Detection Tool See If Your System Has Been Affected by JohnyCryptor

Download

Malware Removal Tool

User Experience Join Our Forum to Discuss JohnyCryptor.

JohnyCryptor Ransomware – Distribution Methods

JohnyCryptor ransomware has a few distribution methods. Like other ransomware viruses nowadays, this one also uses spam emails as the main method of distribution. Such emails have attached files which contain the malware code inside of them. Rarely, the body of the email itself could execute the malicious code.

A possibility of getting infected with the ransomware is via social media networks or by using some file-sharing sites. These services could also spread malware inside executable files disguised as useful or needed applications. One of the best ways you can prevent ransomware infections from happening is by avoiding suspicious files. Just do not download, open or even click files you don’t entirely trust.

JohnyCryptor Ransomware – Detailed Information

JohnyCryptor is the name that has been given to a ransomware crypto-virus. The name comes from the email given by its creators for contact. Simply enough, the extension used as an appendix for encrypted files also has an ending with the same name. Not much other information is given by the ransomware or known yet.

The ransomware will encrypt the files found on your hard disc drives and other storage devices. After the process is complete, you will notice that your desktop wallpaper is changed with a new picture. The picture contains instructions on how to contact the ransomware creators. This is how the picture looks like:

STF-johnycryptor-ransomware-johny-cryptor-aol-ransom-note-desktop

The files read the following:

Attention!
Your computer has been encrypted by cryptographically strong algorithm. All your files are now encrypted. You have only one way to get them back safely – using original decryption tool. Using another tools could corrupt your files, use it on your own risk.
To get original decryptor contact us with email.
JohnyCryptor@aol.com
It is in your interest to respond as soon as possible to ensure the restoration of your files, because we won’t keep your decryption keys at our servers more than one week in interest of our security.

PS. only in case you do not receive a response from the first email address within 48 hours, please use this alternative email address
JohnyCryptor@india.com

The JohnyCryptor virus is very different from recent ransomware. Neither does it specify a price for paying for decryption, nor does it push you to pay in a day or two. Instead, you are given a whole week to do something, and afterward, your files will be just deleted. Although the ransomware creators claim that they will delete files because of security reasons, it sounds more like a threat.

Do NOT contact JohnyCryptor@aol.com or the alternative email address with thinking of paying any sum of money. Funding criminals can give them the inspiration to do more crimes or make a worse kind of ransomware variant for JohnyCryptor. No guarantee exists that you will get your files back or if you are going to be given a decryptor at all.

The JohnyCryptor ransomware encrypts different kinds of files. The aim of encryption is probably pictures and documents as those files are precious to users. That is due to the fact that usually such files preserve memories or valuable information for the users. The JohnyCryptor ransomware ransomware encrypts these file extensions:

→.jpg, .jpg2, .png, .ppt, .pptm, .pptx, .bmp, .doc, .docm, .docx, .docxml, .pdf, .gif, .rtf, .tar, .targz, .targz2, .txt, .xlmv, .xls, .xlsm, .xlsx, .xml, .mkv, .mov , .mp4, .mpeg, .mpg, .msg, .myd, .myi, .obj, .odb, .odc, .odm, .ods, .oft,. one, .onepkg, .onetoc2, .opt, .oqy, .p7b, .p7c, .pcx, .pdd, .pdp, .pem, .pfx, .php, .php3, .php4, .php5, .phtml, .pl, .pm, .pot, .potm, .potx, .pps, .ppsn, .prn, .pst, .ptx, .pxr, .py, .ai3, .ai4, .ai5, .ai6, .arw, .as, .ASA, .ascx, .asmx, .asp, .aspx,. asr, .avi, .bak, .bay, .bz2, .c, .cdr, .cer, .cfc, .cfn, .cfnl, .cin, .chm, .class, .config, .cpp, .crt, .cs, .css, .csv, .cub, .dae, .db, .dc3, .dcm, .der, .dic, .dif, .divx, .djvu, .dl, .dot, .dotm , .dotx, .dpx, .dqy, .dtd, .dwg, .dx, .dxf, .dsn, .dwt, .eps, .exr, .fido,. frm, .gz, .h, .hpp, .hta, .htc, .htm, .html, .icb, .ics, .iff, .inc, .ind, .ini, .iqy, .j2c, .i2k, .java, .jp2, .jpc, .jpf, .jpx, .js, .jso, .json, .kmz, .lbi, .m4v, .mdb, .mdf, .mef , .mht, .mhtml, .r3d, .rar, .rdf, .rle , .rqy, .rss, .rw2, .rwl, .sct, .sdpx, .shtm, .shtml, .slk, .sln, .sql,. srw, .ssi, .stn, .svg, .svg2, .swf, .tdi, .tga, .tld, .u3d, .udl, .uxdc, .vcs, .vda, .wbm, .wbmp, .xlk, .xlm, .xltx, .xlw, .xsd, .xsl, .xsc, .xslt, .xz, .wb2, .wim , .wmv, .zip, .3fr, .3gp, .7z

The list of file extensions given above may be incomplete, but those are the files which will get encrypted. When the encryption process is finished, all files will have this extension appended – .id-[Your ID number]-johnycryptor@aol.com.

JohnyCryptor ransomware could delete Shadow Volume Copies inside the Windows Operating System. It is recommended that you do a check for this, as you might have a different version of the ransomware that has left the Shadow backups of your system intact.

Remove JohnyCryptor Ransomware and Restore johnycryptor@aol.com Files

If your computer is infected with the JohnyCryptor ransomware, you should have some experience in removing viruses. You should get rid of this ransomware as fast as you can before it spreads further via the network and infects more files. You should remove the ransomware and follow the step-by-step instructions given below.

Manually delete JohnyCryptor from your computer

Note! Substantial notification about the JohnyCryptor threat: Manual removal of JohnyCryptor requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove JohnyCryptor files and objects.
2. Find malicious files created by JohnyCryptor on your PC.
3. Fix registry entries created by JohnyCryptor on your PC.

Automatically remove JohnyCryptor by downloading an advanced anti-malware program

1. Remove JohnyCryptor with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by JohnyCryptor in the future
3. Restore files encrypted by JohnyCryptor
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.