.CERBER6 File Virus (GPAA) – Remove and Restore Files - How to, Technology and PC Security Forum | SensorsTechForum.com

.CERBER6 File Virus (GPAA) – Remove and Restore Files

This article has been created to show you how to remove the .cerber6 file virus from your computer system and try to get back files encrypted with the .cerber6 extension.

A ransomware virus, using the .cerber6 file extension which it adds to the files encrypted by it has been detected in the wild. The virus claims to be GPAA (Global Poverty Aid Agency), however it may be nothing like it, because it extorts it’s victims for the humongous sum of 10.91 BTC. For this price, the cyber-criminals behind it promise to decrypt your files. If your computer has been infected by the .cerber6 file virus, we would recommend that you read this article.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionThe .cerber6 infection encrypts the files on the compromised computer making them no longer able to be opened. Demands a ransom payoff of 10.91 BTC.
SymptomsThe .cerber6 file extension is added to the encrypted files. !READ.htm ransom note is added with a QR scan code.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by CERBER6


Malware Removal Tool

User ExperienceJoin Our Forum to Discuss CERBER6.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

How Does .cerber6 File Virus Infect

This type of ransomware virus is specifically designed to encrypt files. Given the high ransom demand which is the humongous 10.91 BTC, the virus is not joking around and the attackers have invested in multiple tools that may spread it.

The primary method of infecting victim PCs with the .cerber6 ransomware is conducted via exploiting an unprotected RDP configuration. However, as reported by researchers this may not be the only way by which your computer may have been infected by this virus.

Another method of infection which may be related to .cerber6 file infection is to spread a loader file that also contains Windows exploits to infect your computer unsuccessfully. Such files may be sent to you via e-mail attachments as well as uploaded online on suspicious websites, posing as:

  • Fake setups of programs.
  • Game patches or cracks.
  • License activators.
  • Key generators.

But the virus may come onto your system via web-injectors as well. This means that It may also be spread via malicious web links that cause a redirect to the infection script. Such web links may be spammed as comments or exist in any other form online.

.cerber6 Ransomware – Analysis

Once an infection by .cerber6 takes place on your computer, the ransomware virus immediately drops a malicious file. This file has a completely random name and is an executable type of file. Besides this file, the .cerber6 file virus may also drop other support files that are usually the following file types:

→ .dll, .tmp, .vbs, .cmd, .bat

The malicious files of .cerber6 may be located in several different Windows directories:

  • %AppData%
  • %Temp%
  • %Roaming%
  • %Local%
  • %LocalLow%
  • %Windows%

In addition to these objects, this ransomware virus also leaves behind it’s ransom note, which is the primary method to motivate you into paying the ransom. The note is named !READ.htm and it contains the following message:

Congradulations! Now you are a member of GPAA (Global Poverty Aid Agency).
We need bitcoins, our crowdfunding goal is to get 1000 BTCs. 1 BTC for 1 CHILD!
>> Click Here To Buy Bitcoins << Q: What happened? A: Ooops, your inportant files are encrypted. lt weans you will not be able to access them anyeore until they are decrypted. These files could NOT be decrypted if you do not have the KEY (RSA4096). Q: How can I get the decrypt programme? A: Your task is 10.91 btc. Send the correct amount to the bitcoin address 19ZLfCEpxdskvWGLLhNUnM6dUG7yikhz2W You can send more coins. When the goal is achieved, you will get the decrypt programme. Q: Where to get the decrypt programme? A: When the goal is achieved, we will send it to sc19ZLfCEpxdskvWGLLhNUnM6dUG7yikhz2W@outlook.com (You may register it first with the specified password: Save1000Children!!! ).

Other activity of the .cerber6 file virus is to likely make it harder for you to restore your files. This is done by deleting the Windows restore points and shadow volume copies. But before doing this, the GPAA ransomware virus has to obtain administrative permissions. Only then it can enter the following commands in WCP as an administrator to delete Windows backups:

→ process call create “cmd.exe /c
vssadmin.exe delete shadows /all /quiet
bcdedit.exe /set {default} recoveryenabled no
bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

.cerber6 Ransomwre – The Encryption

Although it has not been confirmed as the latest variant of the notorious Cerber ransomware, this virus may use an encryption just as strong on your files. It’s primary end goal is to render the files no longer openable, but in the same time generate unique keys which are sent to the crooks and make them the only ones able to unlock your files.

The .cerber6 file virus is programmed in a way to look only for specific types of files to encrypt. These files are often used documents, pictures, audio files plus other often used files. The file types it looks for to encrypt have the following file extensions:

→ .123, .3dm, .3dmap, .3ds, .3dxml, .3g2, .3gp, .602, .7z, .accdb, .act, .aes, .ai, .arc, .asc, .asf, .asm, .asp, .assets, .avi, .backup, .bak, .bat, .bdf, .blendl, .bmp, .brd, .bz2, .c, .c4dl, .catalog, .catanalysis, .catdrawing, .catfct, .catmaterial, .catpart, .catprocess, .catproduct, .catresource, .catshape, .catswl, .catsystem, .cdd, .cgm, .class, .cmd, .config, .cpp, .crt, .cs, .csr, .csv, .dae, .db, .dbf, .dch, .deb, .der, .dif, .dip, .djvu, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .edb, .eml, .fbx, .fla, .flv, .frm, .gif, .gl, .gl2, .gpg, .gz, .h, .hpgl, .hwp, .ibd, .icem, .idf, .ig2, .igs, .ipt, .iso, .jar, .jasl, .java, .jpeg, .jpg, .js, .jsp, .key, .lay, .lay6, .ldf, .library, .m3u, .m4u, .mal, .max, .maxl, .mb, .mdb, .mdf, .mid, .mkv, .mml, .model, .mov, .mp3, .mp4, .mpeg, .mpg, .msg, .myd, .myi, .nef, .obj, .odb, .odg, .odp, .ods, .odt, .onetoc2, .ost, .otg, .otp, .ots, .ott, .p12, .paq, .pas, .pdf, .pem, .pfx, .php, .pl, .png, .pot, .potm, .potx, .ppam, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .ps, .ps1, .psd, .pst, .rar, .raw, .rb, .rtf, .sch, .session, .sh, .sldm, .sldx, .slk, .sln, .snt, .sql, .sqlite3, .sqlitedb, .stc, .std, .step, .sti, .stp, .stw

If the file extensions on your computer match with some of the ones above, the GPAA ransomware infection encrypts them and then adds the .cerber6 file extension as a suffix to them. During the encryption process, your computer may freeze and after this you will begin seeing your files looking like the following:

The virus also begins to pretend it is a charity agency, claiming it helps hungry children, but there is no way to confirm this. In any case, experts strongly advise against paying the ransom, because you may not get your files back and you support criminal activity.

Remove GPAA Ransomware and Restore .cerber6 Encrypted Files

Before beginning the removal process of this ransomware virus, we urge you to backup your files, despite the fact that they are encrypted.

Since the .cerber6 file virus is by far one of the worst type of threats you can encounter, it may create multiple different objects in critical for Windows places and files. Removing these files manually may eliminate the virus, but you also risk breaking your operating system. This is why, security experts recommend removing the .cerber6 file virus automatically with a ransomware-specific removal software that will scan for the malicious objects and eliminate them safely.

At this point, there is no free decrypter for this ransomware virus. But we will track the situation and update as soon as there is one developed, so follow this blog post.

In the meantime, do not despair, there are still ways by which you can restore your encrypted files. These methods are alternative and in no way 100% effective, however you may be able to restore a big portion of your encrypted files. For more information, check step “2. Restore files encrypted by .cerber6 virus.”


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share