Ladon Ransomware Removal - Restore .Ladon Files

Ladon Ransomware Removal – Restore .Ladon Files

This article will aid you to remove Ladon ransomware absolutely. Follow the ransomware removal instructions provided at the end of the article.

Ladon is a virus that encrypts your files and demands money as a ransom to get your files restored. According to some malware researchers, all files of a compromised computer get locked with the AES military grade encryption algorithm. The Ladon cryptovirus will encrypt your data and files, while also appending the .Ladon suffix as a secondary extension to each file. Continue to read the article and see how you could try to potentially recover some of your files.

Threat Summary

NameLadon
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts files on your computer system and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with the AES encryption algorithm. All locked files will have the .Ladon suffix extension appended to them.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Ladon

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Ladon.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Ladon Ransomware – Ways of Distribution

Ladon ransomware might spread its infection in various ways. A payload dropper which initiates the malicious script for this ransomware is being spread around the World Wide Web, and researchers have gotten their hands on a malware sample. If that file lands on your computer system and you somehow execute it – your computer system will become infected.

Ladon ransomware might also distribute its payload file on social media and file-sharing services. Some malware researchers state that Vkontakte (Russia’s main social network) has been used into delivering spam messages containing the payload files. Adding to that, the researchers also state that email spam messages using the same delivery tactics have been used.

Below you can see the detections of the threat’s payload on the VirusTotal service:

Freeware which is found on the Web can be presented as helpful also be hiding the malicious script for the cryptovirus. Refrain from opening files right after you have downloaded them. You should first scan them with a security tool, while also checking their size and signatures for anything that seems out of the ordinary. You should read the tips for preventing ransomware located at the corresponding forum thread.

Ladon Ransomware – In-Depth Description

Ladon is a virus that encrypts your files and places an .html file, with instructions inside the infected computer system. The extortionists want you to pay a ransom fee for the alleged restoration of your files. The ransom fee may vary according to the victims. A couple of companies have already claimed to be hit with this ransomware and is possible that they will be charged more for the alleged recovery of their files.

The ransomware might be named after a mythical serpent-like dragon of the same name that twined and twisted around the tree in the Garden of the Hesperides and was the golden apples guardian. However, it is unknown whether the cybercriminals behind the ransomware named it after a dragon or not.

Ladon ransomware could make entries in the Windows Registry to achieve persistence, and could launch or repress processes in a Windows environment. Such entries are typically designed in a way to launch the virus automatically with each start of the Windows operating system.

After encryption the Ladon virus shows a ransom message located inside one of the following two files.

  • READ_ME.txt
  • READ_ME.html

You can see its contents of the .html file, from the following screenshot given down here:

The ransom note states the following:

What happened to my files?

Your files are encrypted with strong, military-grade encryption. In order to recover them you must pay a fee. This fee is not very large and can range from 200-300$. Failure to pay the fee will result in the loss of your files. There is no deadline for when you can pay.

How can I trust you?

Your files will be recovered immediately after our service detects that you have paid. In order to allow this, please allow our program to continue running so that it can retrieve your files. We can help and provide assistance in chat to those who need it. (NOTE: We do not respond to requests to lower the fee.)

How can I pay?

We only accept a form of digital currency known as Bitcoin. There are many guides on how to buy this online, which you can find from googling. If you want to buy bitcoin using paypal, giftcard, and other forms of payment, then http://www.paxful.com is a great and easy way.

Where is my CONTACTID?

Your CONTACTID should be written on your background or located in the file: READ_ME.txt which can be found on your desktop. Please retrieve it as this is necesary for payment in order to retrieve your files. This may require checking to see if your antivirus has deleted this file. If it has please recover it. Without this file, there is no hope to retriving your files. It is a good idea to store your contactid in a safe spot until your files are retrieved.

I have paid, how long will it take?

Once you pay, it depends on how long it takes for the transaction to verify. This can be 1 minute – 1 day.
How do I remove this program once I have retrieved my files?
The program will remove itself from your computer. You are welcome to try an antivirus or any other program to confirm our claim.

Is there any program or any other way to recover my files?

There is no possible way to recover your files without paying us. Any attempt to use any decryptors/tools may permanently damage your files!

If you visit the help page on that TOR Network Web domain, you will get the following message:

For some reason, the ransomware authors are cursing Brian Krebs, who is an American journalist and investigative reporter best known for covering stories about extortionists in the digital world.

The note of the Ladon ransomware states that your files are encrypted. You are demanded to pay around 200 and 300 US dollars. However, you should NOT under any circumstances pay any ransom sum. Your files may not get recovered, and nobody could give you a guarantee for that. Adding to that, giving money to cybercriminals will most likely motivate them to create more ransomware viruses or commit different criminal activities. That may even result to you getting your files encrypted once again.

Ladon Ransomware – Encryption Process

What is known for the encryption process of the Ladon ransomware is that every file that gets encrypted will receive the .Ladon suffix. That suffix is appended to the name of an encrypted file as a secondary extension. The original extension and filenames remain unchanged after encryption, as the .Ladon extension is added.

Files containing the following extensions will become encrypted by the ransomware:

→.3dm, .3g2, .3gp, .7zip, .aaf, .accdb, .aep, .aepx, .aet, .ai, .aif, .as, .as3, .asf, .asp, .asx, .avi, .bmp, .c, .class, .cpp, .cs, .csv, .dat, .db, .dbf, .doc, .docb, .docm, .docx, .dot, .dotm, .dotx, .dwg, .dxf, .efx, .eps, .fla, .flv, .gif, .h, .idml, .iff, .indb, .indd, .indl, .indt, .inx, .jar, .java, .jpeg, .jpg, .js, .m3u, .m3u8, .m4u, .max, .mdb, .mid, .mkv, .mov, .mp3, .mp4, .mpa, .mpeg, .mpg, .msg, .pdb, .pdf, .php, .plb, .pmd, .png, .pot, .potm, .potx, .ppam, .ppj, .pps, .ppsm, .ppsx, .ppt, .pptm, .pptx, .prel, .prproj, .ps, .psd, .py, .ra, .rar, .raw, .rb, .rtf, .sdf, .sdf, .ses, .sldm, .sldx, .sql, .svg, .swf, .tif, .txt, .vcf, .vob, .wav, .wma, .wmv, .wpd, .wps, .xla, .xlam, .xll, .xlm, .xls, .xlsb, .xlsm, .xlsx, .xlt, .xltm, .xltx, .xlw, .xml, .xqx, .xqx, .zip

The Ladon cryptovirus could be set to erase all the Shadow Volume Copies from the Windows operating system with the help of the following command:

→vssadmin.exe delete shadows /all /Quiet

In case the above-stated command is executed that will make the effects of the encryption process more efficient. That is due to the fact that the command eliminates one of the prominent ways to restore your data. If a computer device was infected with this ransomware and your files are locked, read on through to find out how you could potentially restore some files back to their normal state.

Remove Ladon Ransomware and Restore .Ladon Files

If your computer system got infected with the Ladon ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Manually delete Ladon from your computer

Note! Substantial notification about the Ladon threat: Manual removal of Ladon requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Ladon files and objects
2. Find malicious files created by Ladon on your PC

Automatically remove Ladon by downloading an advanced anti-malware program

1. Remove Ladon with SpyHunter Anti-Malware Tool and back up your data
2. Restore files encrypted by Ladon
Optional: Using Alternative Anti-Malware Tools

Berta Bilbao

Berta is the Editor-in-Chief of SensorsTechForum. She is a dedicated malware researcher, dreaming for a more secure cyber space.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...