This article provides information about a version of Scarab data locker ransomware dubbed Rebus. The threat encrypts important files and demands a ransom payment. By reaching the end of the article, you will know how to remove the threat and how to restore .REBUS files.
Rebus is a newly detected ransomware that belongs to the Scarab family. It is classified as data locker ransomware due to its main purpose to locate target files and encode them. Corrupted data can be recognized by the specific extension .REBUS that stands at the end of their names. Hackers behind Rebus ransomware demand a ransom for the decryption of .REBUS files.
|Short Description||A data locker ransomware that utilizes AES cihper algorithm to encrypt target files stored on the infected computer. Then it demands a ransom for a specific decryption solution.|
|Symptoms||Important files are locked and renamed with .REBUS extension. The access to the information they store remains restricted until a ransom is paid.|
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by Rebus |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss Rebus.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Rebus Ransomware – Distribution
An infection with Rebus ransomware could be triggered by a malicious payload that sneaks into computer systems with the help of various shady techniques of distribution. Preferred by hackers are the email spam campaigns. Crafted emails often attempt to trick users into installing the ransomware directly on their PCs. The malicious components parts of such emails usually are various kinds of file attachments and/or in-text links. To make users more prone to open an attached file or visit a corrupted web page, hackers impersonate representatives of well-known companies or even governmental institutions. In case of interaction with any of the malicious components the ransomware gains access to the system and starts the infection process.
Next time when you need to open a dubious file on your PC you can use a free online extractor to identify whether the file contains malicious elements or not. Once you have this information you could easily prevent severe malware infections like Rebus ransomware from infecting your system.
Rebus (Scarab) Ransomware – Overview
Once Rebus ransomware payload is running on the system it initiates a sequence of changes that affect various system settings. At first, it could create additional malicious files and locate some of them in the following folders:
As the payload may not contain the commands that will lead the infection to its very end, Rebus may contact its command and control server to drop more needed files and objects. It is likely that some of them are self-destroying so at the end of the attack, only part of all malware files may remain on the system.
The remaining files could be used by hackers to establish a connection with the infected PC and monitor the activities performed on it. Furthermore, they could unnoticeably install another malware and record all keystrokes, steal sensitive credentials or use system resources to mine for any cryptocurrency.
A specific trait of Rebus ransomware is its ransom note that it displays on the PC screen. The note is contained in a file called REBUS RECOVERY INFORMATION.TXT and that is reads is:
YOUR FILES ARE ENCRYPTED!
Your personal ID
Your documents, photos, databases, save games and other important data was encrypted.
Data recovery the necessary decryption tool. To get the decryption tool, should send an email to:
email@example.com or firstname.lastname@example.org
If you dont get reply in 24 hours use jabber:
Letter must include Your personal ID (see the beginning of this document).
In the proof we have decryption tool, you can send us 1 file for test decryption.
Next, you need to pay for the decryption tool.
In response letter You will receive the address of Bitcoin wallet which you need to perform the transfer of funds.
If you have no bitcoins
* Create Bitcoin purse: https://blockchain.info
* Buy Bitcoin in the convenient way
https://en.wikipedia.org/wiki/Bitcoin (the instruction for beginners)
– It doesn’t make sense to complain of us and to arrange a hysterics.
– Complaints having blocked e-mail, you deprive a possibility of the others, to decipher the computers.
Other people at whom computers are also ciphered you deprive of the ONLY hope to decipher. FOREVER.
– Just contact with us, we will stipulate conditions of interpretation of files and available payment,
in a friendly situation
– When money transfer is confirmed, You will receive the decrypter file for Your computer.
* Do not attempt to remove a program or run the anti-virus tools
* Attempts to decrypt the files will lead to loss of Your data
* Decoders other users is incompatible with Your data, as each user unique encryption key
Negotiations and contacts with hackers should be avoided as they can try to scam you and make you a victim of their malicious intentions for the second time.
Rebus Ransomware – Encryption Process
All initial system modifications are made to support the completion of Rebus’s main purpose which is encryption of target files. For the encryption Rebus is known to utilize the strong AES cipher. This cipher changes completely the original code of predefined types of files including:
- Audio files
- Video files
- Document files
- Image files
- Backup files
- Banking credentials, etc
After encryption, all corrupted files have completely changed names that end with the extension .REBUS. The access to the information stored by .REBUS files is restricted as hackers demand a ransom payment for the specific decryption key. The ransomware generates this key during the encryption process. Unfortunately, immediately after this event, the key is transferred to criminals’ host.
Beware that there is no guarantee that the Rebus ransomware has code that enables it to generate working decryption keys. This means that the key possessed by hackers could be broken and unable to decrypt your .REBUS files. So don’t rush into transferring them the ransom before you try to resolve the problem with the help of alternative solutions.
Remove Rebus Ransomware Ransomware and Restore .REBUS Files
The removal of this Scarab ransomware version named Rebus demands a bit of technical experience and ability to recognize characteristics of malware files. And there is no doubt that you should remove this nasty threat from the infected PC as soon as you detect it. Below you could find how to do it step by step. Beware the ransomware is a highly complex threat that is designed to plague your whole system and not only your files. That’s why security researchers recommend the use of an advanced anti-malware tool for its removal. Such tool will keep your system protected against devastating threats like Rebus as well as all other kinds of malware in future.
After you remove the ransomware make sure to check the “Restore Files” step listed in the guide below. But before you take any further actions, don’t forget to back up all encrypted files to an external drive in order to prevent their irreversible loss.