Yet another variant of the notorious STOP ransomware family of viruses has resurfaced carrying the name Lokf virus. The main objective of these viruses is to encrypt the files on your computer and hold them hostage until you pay a ransom in BitCoin to get them to work again. Read this article to understand how you can remove the Lokf virus and how you can try and restore your files.
|Short Description||A cryptovirus that encodes your files and wants you to pay a big ransom in order to get the encrypted files to work again.|
|Symptoms||Files have the .lokf virus extension. The virus also shows a ransom note, called _readme.txt.|
|Distribution Method||Spam Emails, Email Attachments, Executable files|
|Detection Tool|| See If Your System Has Been Affected by Lokf virus |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Lokf virus.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Decrypt Lokf Virus Ransomware – Update November 2019
The good news for all victims of STOP Lokf ransomware is that the security researcherс found weaknesses in the code of this variant and released an updated version of the free STOP ransomware decryption tool.
So the moment you remove all malicious files and objects from your infected system you can enter our data recovery guide where you will find a download link for the free Lokf decryption tool and learn how to proceed with the decryption process.
Have in mind that the tool is designed to support specific offline and online IDs, so it may not be effective for all occasions of Lokf virus ransomware infections.
Lokf Virus – Fresh Information Spotted Around the Web
According to the researcher who discovered the Lokf variant of STOP Ransomware, Michael Gillespie, this infection can cause massive ammount of damage to victims and is still undecryptable. The researcher tweeted in call for the victims of the viruses to send him information so that he can attempt to devise decyptor:
Lokf virus has come out during November, 2019 and has been hitting computers ever since. The ransomware aims to slither past defenses of Windows, utilizing concealing techniques and exploits to assume rights as administrator. Then, the victims have their files encrypted and the virus sets the ransom note _readme.txt that has two new e-mails for contact. Unlike the previous e-mails used (gorentos e-mails), the new ones look like the following:
The main virus file of Lokf virus had the following information embedded in it:
Lokf Virus – How Did I Get It and What Does It Do?
Lokf virus may enter your computer in a variety of ways, the main of which could be having the virus files uploaded online. The Lokf virus can be uploaded on several suspicious websites, where it may pretend to be a completely legitimate type of setup, program, patch, portable software, crack or key generator. The main idea is for victims to get tricked into downloading and running the virus file, which when executed exploits weaknesses in your computer in order to make a silent infection.
When the Lokf virus is added to your computer, it may immediately show its presence by obtaining administrator rights and starting to encrypt your files. The files that are encrypted by the Lokf virus are with the Lokf virus file extension.
Not only this, but the Lokf virus also drops a ransom note on victimized computers and this note aims to threaten you that there is a risk for you to never see your files again if you do not pay the hackers behind the Lokf virus ransom in BitCoin. The note is named _readme.txt and it has the following contents:
Don’t worry my friend, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool: https://we.tl/t-1aaC7npeV9 Price of private key and decrypt software is $490. Discount 50% available if you contact us first 72 hours, that’s price for you is $490. Please note that you’ll never restore your data without payment. Check your e-mail “Spam” folder if you don’t get answer more than 6 hours.
To get this software you need write on our e-mail:
Reserve e-mail address to contact us: Your personal ID:
If you have been infected by the Lokf version of STOP Ransomware we strongly recommend that you not pay the ransom and backup all of the Lokf virus files so that you can restore them for free later on, when a decryptor comes out. For this family of viruses, a decryptor takes about a week time to be released by malware researchers and it can get your files back absolutely for free.
Remove Lokf Virus and Try to Restore Encrypted Files
If you want Lokf virus ransomware completely gone from your computer, we do recommend that you read the instructions underneath this article. They have been created to help you to remove this virus step by step from your computer. If you cannot manually find and delete all Lokf virus files, then do not worry, because you can remove them automatically. According to security experts, the most reccommended type of removal is if you download and run a scan of your computer by using an advanced anti-malware software. This program will effectively make sure to thoroughly detect and eliminate all Lokf virus files and protect your machine in the future as well.
Not only this, but to restore files, encrypted by the Lokf virus, we suggest that you also check out the alternative methods for file recovery below. They may not come with a 100% file restore guarantee, but with their aid you may be able to restore some of them at least.