Globe3 ransomware was released several months ago and ever since it’s release, the virus has become immensely widespread in multiple variants, just like Globe and Globe2 have come out. The ransomware has switched to the popular AES-256 encryption algorithm to encode the files of the computers that have been infected and then display a ransom note with further demands to pay a hefty ransom fee to get the files back. Thankfully, Emsisoft researchers have developed a decrypter for this virus and now you have the chance to restore your files for free, instructions for which you will find if you keep reading this article.
Globe3 Ransom Virus – Background
What is specific for all the Globe versions is that the virus uses a builder app which is used by every cyber-criminal who wants to create his own customized version of the application, including custom extension, custom payload downloader, custom wallpaper and other modifiable aspects of the virus.
The most popular Globe3 associated versions use the following file extensions they append on encrypted files:
But this is not all concerning Globe. Some, more experienced coders, have also released heavily modified versions of the virus, like Purge ransomware variants which were also decrypted later on.
Not only this, but the file extensions the virus attacks are also a very large number. The encryption is also performed via a fake system32.exe system process which runs undetected by most conventional antivirus software.
After encryption, the conventional Globe ransom note is dropped:
Fortunately, now it is possible to decrypt the encrypted files for free after removing Globe3. For maximum effectiveness during the removal and decryption processes, we advise following the instructions below.
Globe3 Ransom Virus – Remove and Decrypt the Files
First, before begging any decryption process, advices are to immediately secure the computer you are decrypting files from. To do this, you should remove any files and registry objects on the infected computer by carefully following the after-mentioned removal steps. For maximum effectiveness during removal, experts strongly recommend to use an advanced anti-malware program.