STOP ransomware has arrived in a brand new variant, carrying the .codnat file extension. The virus’s main goal Is to encrypt the files on the compromised computers and then ask victims to pay ransom to get the files recovered back to normal. The ransomware may also leave behind a ransom note, containing instructions on how to pay the ransom. If your computer has been infected by the .codnat STOP ransomware, we strongly recommend that you read this article fully.
|Name||.codnat STOP Ransomware|
|Short Description||Files are encrypted and the victims cannot open them unless they pay ransom.|
|Symptoms||Files have the .codnat file extension added to them. A ransom note _readme.txt file is also dropped.|
|Distribution Method||Spam Emails, Email Attachments, Executable files|
See If Your System Has Been Affected by .codnat STOP Ransomware
Malware Removal Tool
|User Experience||Join Our Forum to Discuss .codnat STOP Ransomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
.codnat Files Virus – Update May 2019
The good news for all victims of STOP .codnat ransomware is that the security researcher Michael Gillespie cracked the code of this variant and released an updated version of his STOP ransomware decrypter.
So the moment you remove all malicious files and objects from your infected system you can enter our data recovery guide where you will find a download link for the free .codnat decryption tool and learn how to proceed with the decryption process.
Have in mind that the tool is designed to support specific offline IDs, so it may not be effective for all occasions of .codnat ransomware infections.
.codnat Ransomware – How Did I Get It and What Does It Do?
The primary way of distribution of the .codnat ransomware virus is usually done via several different methods. The main one of those methods is to get victims to open a malicious file that is usually sent to them as an e-mail attachment. Usually, such files tend to replicate by pretending to be important documents, like invoices, images and many other forms of seemingly legitimate documents.
Not only this, but also the .codnat Ransomware may infect you via compromised sites, where the ransomware infection file, could be uploaded as a setup, crack, portable program or other form of software.
Either way, once you run the infection files of this virus, your computer could immediately become compromised and the .codant variant of STOP ransomware may have it’s virus files dropped. The files of the .codnat ransomware may be in the following directories:
Among the dropped files could also be a file, called the ransom note. The file is named _readme.exe and has the following contents:
Don’t worry my friend, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that’s price for you is $490.
Please note that you’ll never restore your data without payment.
Check your e-mail “Spam” or “Junk” folder if you don’t get answer more than 6 hours.
To get this software you need write on our e-mail:
Reserve e-mail address to contact us:
When .codnat ransomware begins to encrypt files, the virus may attack the following file types:
- Audio files.
- Files, used by other software on your computer.
Once the files are encrypted, the .codnat extension is appended after their original one and they begin to appear like the following:
In addition to this, the .codnat ransomware also performs a lot of malicious activities during this process as well:
- Checks if it’s running on a real or a virtual OS.
- Tampers with the Windows Registry Editor.
- Obtains your network and system information.
- May create scheduled tasks.
The main goal of the .codnat variant of STOP ransomware is to encrypt your files and ask you to pay ransom. It is not advisable to pay this ransom, because for one you cannot trust the cyber-criminals who are behind this variant of STOP and more so, by paying you support their cyber-criminal activities. Instead, it is recommended that you backup the encrypted files and then remove this STOP variant.
Remove STOP Ransomware and Try to Restore .codnat Files
In order to make sure that the .codnat version of STOP ransomware is gone from your computer, we would strongly recommend that you follow the removal steps below. If the first two manual removal steps may not work for you, experts recommend taking a more automatic approach. According to them, the most effective and safest method to remove the .codnat ransomware is to download and run a scan of your computer, by using an advanced anti-malware software. Such software aims to detect and remove all files, related to .codnat ransomware and protect your computer in the future too.
If you want to try and restore files, the first thing you should do is back them up. Save them on a flash drive or somewhere else. Then, we suggest that you keep them until a free decryptor for this variant of STOP ransomware is available. Until then, you could try using the alternative file recovery instructions below in the “Try to restore” step. They may not be a 100% guarantee for file recovery, but with their help, you could retrieve at least some of your files.