Hey you,

35,000 ransomware infections per month and you still believe you are protected?

Sign up to receive:

  • alerts
  • news
  • free how-to-remove guides

of the newest online threats - directly to your inbox:

Yakes Ransomware – Removal and Decryption Methods

ransomware-virus Ransomware infections continue. Not only are new versions of well-known threats appearing, but also new ransomware cases are registered on a daily basis. One of the latest ransomware threats currently targeting users is dubbed Yakes. According to researchers, Yakes ransomware is spread via spam email attachments. This article aims to help its victims.

Threat Summary

Name Yakes Ransomware
Type Ransomware Trojan
Short Description The ransomware encrypts users’ files and demands a ransom in the amount of 4 Bitcoins.
Symptoms The user’s files are encrypted and unusable.
Distribution Method Spam email attachments.
Detection Tool See If Your System Has Been Affected by Yakes Ransomware


Malware Removal Tool

User Experience Join our forum to Discuss Yakes Ransomware.

Yakes Ransomware Distribution & Technical Overview

Yakes is, in fact, a ransomware Trojan. It drops a ransom note in all folders containing encrypted data, as reported by Enigma Software researchers. The ransom note is named [date of infiltration]-INFECTION.TXT. As for the ransom message, it contains little information:

Your files are now encrypted. I have the key to decrypt them. I will give you a decrypter if you pay me.

As visible, the ransom note is more of a personal message addressed to the victim. Details about the ransomware are not provided, and from the way the note is written, it seems like the victim is dealing with one cybercriminal.
Two email addresses are provided to victims to contact the cybercriminal(s). If the given emails somehow do not work, the victim is given an option to contact them via BitMessages.

The amount of the ransom demanded by Yakes author(s) is 4 Bitcoins, or $1,811. However, paying the ransom is never a good idea, since the decryption key may never be sent to the victim. Furthermore, it’s safe to say that ransomware is partly successful because of victims’ payments. Continue reading to learn how to try and restore your files via alternative methods.

Yakes Ransomware Removal and File Restoration Methods

An official decryption method for files compromised by Yakes, typically released by security researchers is still awaited. The very first thing you need to do is remove Yakes manually or by running an anti-malware tool. Depending on your skills and knowledge, you can refer to part 1 or part 2 of the removal manual situated below. In the removal manual, you will also find instructions on how to back up your files from now, and how to try and restore your encrypted files via data recovery software.

Manually delete Yakes Ransomware from your computer

Note! Substantial notification about the Yakes Ransomware threat: Manual removal of Yakes Ransomware requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Yakes Ransomware files and objects
2.Find malicious files created by Yakes Ransomware on your PC
3.Fix registry entries created by Yakes Ransomware on your PC

Automatically remove Yakes Ransomware by downloading an advanced anti-malware program

1. Remove Yakes Ransomware with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by Yakes Ransomware in the future
3. Restore files encrypted by Yakes Ransomware

Optional: Using Alternative Anti-Malware Tools

Milena Dimitrova

An inspired writer, focused on user privacy and malicious software. Enjoys 'Mr. Robot' and fears '1984'.

More Posts - Website

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.