This article will aid you remove CommonRansom virus effectively. Follow the removal instructions at the end.
The CommonRansom virus is a newly discovered ransomware threat that does not belong to any of the known malware families. The identity of the operators behind the recent attacks are not known. Depending on its configuration active infections can also lead to the installation of other threats — viruses, ransomware, miners and Trojans. Our guide explains how computer users can spot the infections and attempt to remove them.
|The ransomware encrypts files on your computer and displays a ransom message afterward.
|The ransomware will encrypt your files and put the extension .CommonRansom to them after it finishes its encryption process.
|Spam Emails, Email Attachments
See If Your System Has Been Affected by malware
Malware Removal Tool
|Join Our Forum to Discuss CommonRansom virus.
|Data Recovery Tool
|Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.
CommonRansom virus – Distribution
The CommonRansom virus is a newly discovered threat which has been found to compromise machines around the world. At this time the origins of the threat are not known, it is speculated that this threat may be originating from a custom virus service advertised on the underground hacker forums. The other possible theory behind its creation and distribution is that it is the work of the operators behind the distribution.
As the attacks are still limited in number the security reports do not indicate which is the primary distribution method. As a consequence the criminals can use the most popular tactics.
One of the main ones is the use of email SPAM campaigns which can be designed as being sent by companies or services that the users may use. This si done by taking the legitimate design elements and content and copying them in the emails. They can directly distribute the viruses as file attachments or linking them in the body contents. Alongside emails the criminals can also set up download sites that are copies of vendor download pages and well-known Internet portals. These two methods are also used to spread another form of the CommonRansom virus, namely its inclusion in infected payloads. Two of the most common types are the following:
- Infected Documents — They can be of all popular types and contain dangerous macros that will lead to the virus delivery. When they are opened by the victims a prompt will appear asking them to enable the built-in scripts. They will automatically deploy the threat.
- Infected Applications — The criminals can also embed the virus scripts in malicious setup files — they are often made by taking the real installers from the official sites and modifying them. Once the relevant software is installed or the file is merely started the virus will automatically be deployed.
All of these files can also be uploaded via file sharing networks such as BitTorrent. The reason why this is a popular method for spreading both legal and illegal files.
In certain cases the CommonRansom virus can be spread via malicious browser plugins whic hare also known as hijackers. They are made compatible with the most popular browsers and are uploaded to their respective extension repositories. When installed they will modify the default settings and install the virus.
CommonRansom virus – Information
The CommonRansom virus has not undergone an extensive virus analysis yet however we presume that a modular framework is used by its engine. This would allow the operators to further develop and update the malware.
We presume that it will copy the behavior patterns of other successful threats and by doing so the first actions done by the infection engine would be to harvest sensitive data from the compromised machines. This can lead to the retrieval both of anonymous metrics that are used to generate the unique infection ID and personal data. If configured so this module can capture information such as the victim’s name, interests, address and even stored passwords.
All of the acquired information can then be used to bypass discovered security software — anti-virus software, sandbox environments and virtual machine hosts.
Other tactics employed by the CommonRansom virus can include the modification of the operating system. This is done after the security bypass as at this point the malware will have obtained complete control. A common action is the setup of the virus as a persistent threat — this will automatically start the engine once the computer boots. This can cause certain system processes and third-party applications not to start or at all. Another consequence would be the manipulation of entries that are used by Windows and the user-installed applications. This can cause serious performance issues when using the computer and the inability to start certain functions.
If configured so the CommonRansom virus can also delete sensitive data: System Restore Points or Shadow Volume Copies.
A serious consequence of having an active CommonRansom virus infection is the fact that it can lead to additional payload delivery. The criminals can include the ability to install a Trojan infection. This is done by deploying a client that establishes a secure and constant connection to a hacker-controlled server. Through it the hacker controllers will be able to overtake control of the systems.
CommonRansom virus – Encryption Process
The CommonRansom virus follows the classic ransomware behavior pattern of targeting sensitive user data with a strong cipher. This is done so according to a built-in list of target file type extensions. An example one can be run against the following data:
As a result the affected files will be renamed with the .CommonRansom extension. Preceding the final extension the email displayed in the ransomware note. It itself is created in a file called DECRYPTING.txt and reads the following message:
Hello dear friend,
Your files were encrypted!
You have only 12 hours to decrypt it
In case of no answer our team will delete your decryption password
Write back to our e-mail: email@example.com
In your message you have to write:
1. This ID-345678901234567
2. [IP_ADDRESS]:PORT(rdp) of infected machine
3. Username:Password with admin rights
4. Time when you have paid 0.1 btc to this bitcoin wallet:
After payment our team will decrypt your files immediatly
Free decryption as guarantee:
1. File must be less than 10MB
2. Only .txt or .lnk files, no databases
3. Only 5 files
How to obtain bitcoin:
The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click ‘Buy bitcoins’, and select the seller by payment method and price.
Also you can find other places to buy Bitcoins and beginners guide here:
Remove CommonRansom Ransomware and Restore .CommonRansom Files
If your computer got infected with the CommonRansom Ransomware ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.
What is CommonRansom virus Ransomware?
CommonRansom virus is a ransomware infection - the malicious software that enters your computer silently and blocks either access to the computer itself or encrypt your files.
Many ransomware viruses use sophisticated encryption algorithms to make your files inaccessible. The goal of ransomware infections is to demand that you pay a ransom payment to get access to your files back.
What Does CommonRansom virus Ransomware Do?
Ransomware in general is a malicious software that is designed to block access to your computer or files until a ransom is paid.
Ransomware viruses can also damage your system, corrupt data and delete files, resulting in the permanent loss of important files.
How Does CommonRansom virus Infect?
Via several ways.CommonRansom virus Ransomware infects computers by being sent via phishing emails, containing virus attachment. This attachment is usually masked as an important document, like an invoice, bank document or even a plane ticket and it looks very convincing to users.
Another way you may become a victim of CommonRansom virus is if you download a fake installer, crack or patch from a low reputation website or if you click on a virus link. Many users report getting a ransomware infection by downloading torrents.
How to Open .CommonRansom virus files?
You can't without a decryptor. At this point, the .CommonRansom virus files are encrypted. You can only open them once they are decrypted using a specific decryption key for the particular algorithm.
What to Do If a Decryptor Does Not Work?
Do not panic, and backup the files. If a decryptor did not decrypt your .CommonRansom virus files successfully, then do not despair, because this virus is still new.
Can I Restore ".CommonRansom virus" Files?
Yes, sometimes files can be restored. We have suggested several file recovery methods that could work if you want to restore .CommonRansom virus files.
These methods are in no way 100% guaranteed that you will be able to get your files back. But if you have a backup, your chances of success are much greater.
How To Get Rid of CommonRansom virus Virus?
The safest way and the most efficient one for the removal of this ransomware infection is the use a professional anti-malware program.
It will scan for and locate CommonRansom virus ransomware and then remove it without causing any additional harm to your important .CommonRansom virus files.
Can I Report Ransomware to Authorities?
In case your computer got infected with a ransomware infection, you can report it to the local Police departments. It can help authorities worldwide track and determine the perpetrators behind the virus that has infected your computer.
Below, we have prepared a list with government websites, where you can file a report in case you are a victim of a cybercrime:
Cyber-security authorities, responsible for handling ransomware attack reports in different regions all over the world:
Germany - Offizielles Portal der deutschen Polizei
United States - IC3 Internet Crime Complaint Centre
United Kingdom - Action Fraud Police
France - Ministère de l'Intérieur
Italy - Polizia Di Stato
Spain - Policía Nacional
Netherlands - Politie
Poland - Policja
Portugal - Polícia Judiciária
Greece - Cyber Crime Unit (Hellenic Police)
India - Mumbai Police - CyberCrime Investigation Cell
Australia - Australian High Tech Crime Center
Reports may be responded to in different timeframes, depending on your local authorities.
Can You Stop Ransomware from Encrypting Your Files?
Yes, you can prevent ransomware. The best way to do this is to ensure your computer system is updated with the latest security patches, use a reputable anti-malware program and firewall, backup your important files frequently, and avoid clicking on malicious links or downloading unknown files.
Can CommonRansom virus Ransomware Steal Your Data?
Yes, in most cases ransomware will steal your information. It is a form of malware that steals data from a user's computer, encrypts it, and then demands a ransom in order to decrypt it.
Can Ransomware Infect WiFi?
Yes, ransomware can infect WiFi networks, as malicious actors can use it to gain control of the network, steal confidential data, and lock out users. If a ransomware attack is successful, it could lead to a loss of service and/or data, and in some cases, financial losses.
Should I Pay Ransomware?
No, you should not pay ransomware extortionists. Paying them only encourages criminals and does not guarantee that the files or data will be restored. The better approach is to have a secure backup of important data and be vigilant about security in the first place.
What Happens If I Don't Pay Ransom?
If you don't pay the ransom, the hackers may still have access to your computer, data, or files and may continue to threaten to expose or delete them, or even use them to commit cybercrimes. In some cases, they may even continue to demand additional ransom payments.
Can a Ransomware Attack Be Detected?
Yes, ransomware can be detected. Anti-malware software and other advanced security tools can detect ransomware and alert the user when it is present on a machine.
It is important to stay up-to-date on the latest security measures and to keep security software updated to ensure ransomware can be detected and prevented.
Do Ransomware Criminals Get Caught?
Yes, ransomware criminals do get caught. Law enforcement agencies, such as the FBI, Interpol and others have been successful in tracking down and prosecuting ransomware criminals in the US and other countries. As ransomware threats continue to increase, so does the enforcement activity.
About the CommonRansom virus Research
The content we publish on SensorsTechForum.com, this CommonRansom virus how-to removal guide included, is the outcome of extensive research, hard work and our team’s devotion to help you remove the specific malware and restore your encrypted files.
How did we conduct the research on this ransomware?
Our research is based on an independent investigation. We are in contact with independent security researchers, and as such, we receive daily updates on the latest malware and ransomware definitions.
To better understand the ransomware threat, please refer to the following articles which provide knowledgeable details.
As a site that has been dedicated to providing free removal instructions for ransomware and malware since 2014, SensorsTechForum’s recommendation is to only pay attention to trustworthy sources.
How to recognize trustworthy sources:
- Always check "About Us" web page.
- Profile of the content creator.
- Make sure that real people are behind the site and not fake names and profiles.
- Verify Facebook, LinkedIn and Twitter personal profiles.