Initially identified in July 2013, DirtyDecrypt Ransomware has been yet again revived. Researchers report that the crypto virus has spread on over 15 countries over the world with a high detection rate since its discovery. Also known as Revoyem, this ransomware chooses for its victims primarily PCs which are based in Europe and also in the United States of America. Despite this, we cannot guarantee that these cyber-attacks will not replicate to various other places as well. Given that ransomware attacks have “boom-ed” lately and the millions lost by users, it is strongly advisable to have relevant protection. In case you have been infected by DirtyDecrypt aka Revoyem, we strongly recommend reading the below-mentioned article to help you effectively deal with this threat and try to restore the files encoded by this virus.
|Short Description||DirtyDecrypt encrypts the victim’s files and asks for payment.|
|Symptoms||DirtyDecrypt Ransomware locks the user’s PC and his files cannot be reached.|
|Distribution Method||Via exploit kits and visiting adult content websites.|
|Detection Tool|| See If Your System Has Been Affected by DirtyDecrypt |
Malware Removal Tool
|User Experience||Join our forum to Discuss DirtyDecrypt Ransomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
How Does DirtyDecrypt Replicate
Another method of spreading the DirtyDecrypt is characterized by one common element – the usage of the Styx Exploit Kit. Such EK attacks may be common when massive spam e-mail campaigns are conducted. Lately, we have seen a tendency with old crypto viruses like DirtyDecrypt to conduct new spam campaigns and start re-infecting user PCs.
More Information About DirtyDecrypt (Revoyem) Ransomware
After research regarding this cyber-threat has been conducted by Symantec experts, they have established that computers which have been affected by DirtyDecrypt Ransomware have had the following OS’s installed on them:
- Windows 2000
- Windows NT
- Windows XP
- Windows Vista
- Windows 7
After DirtyDecrypt Ransomware has been activated via one way or another, it may create malicious files that have random names in several Windows directories:
Furthermore, DirtyDecrypt Ransomware starts blocking access to the computer by locking its screen and displaying an image to alert the user that his files are encoded. The image is named “DIRTY ALERT” and its message may look like the following:
The cyber-criminals behind DirtyDecrypt do not mess around, and they have even provided the locations of the decryptor in case the victim experiences further difficulties. The cyber-crooks may use untraceable online payment methods, such as Ukash, PaySafeCard, MoneyPak and others to conduct the payoff while being undetected.
If you have decided to pay the ransom asked by DirtyDecrypt’s cyber-crooks, do not. There are several obvious reasons for that:
- You help the cyber-criminals to further replicate DirtyDecrypt Ransomware.
- You may not get back the access to your files.
We would also like to provide a reminder that the most efficient way to secure yourself against file-encryption by DirtyDecrypt is to back them up frequently. For more information about how to protect yourself against DirtyDecrypt, you can check the related article below:
Related Article: Safely Store Your Important Files and Protect Them from Malware
Regarding the file-encryption process of DirtyDecrypt ransomware, it scans primarily for files with the following file extensions:
The encrypted files by DirtyDecrypt can no longer be opened because their code has been scrambled with an advanced encryption algorithm, which may contain one or more ciphers from the RSA, AES, XOR and other types.
DirtyDecrypt Ransomware – Remove It and Restore Encoded Files
To completely delete DirtyDecrypt(Revoyem) Ransomware virus, you should isolate the threat before removing it. To do this, we advise you to carefully follow the removal instructions below and boot your computer in Safe Mode. From there, you may want to go over and take a look at the Manual and Automatic options for removal below. In case DirtyDecrypt modifies various registry entries and creates additional files, experts strongly advise using an advanced anti-malware program to automatically remove the virus in safe mode without damaging your computer.
In case you want to restore files encoded by DirtyDecrypt Ransomware, we strongly suggest that you take advantage of the alternative solutions for file restoration which we have provided below. They are not 100 percent guarantee you will get your files back, but they are the best alternative solutions you can get to until a decryptor has been released for free in public. When such software is released, make sure to follow this article – we will update it with a download URL for the decryptor.