Remove Fsociety Ransomware and Restore AES Encrypted Files - How to, Technology and PC Security Forum |

Remove Fsociety Ransomware and Restore AES Encrypted Files

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)

fsociety-ransomware-sensorstechforum-comwallpaperMr. Robot TV series has become the inspiration for malware writers to create a ransomware, called Fsociety. The virus aims to imitate a fictional hacking group from the famous TV series, just like Anonymous is. As much as we enjoy hearing new Mr. Robot news, this one is unfortunate, because the Fsociety ransomware uses an extremely strong encryption algorithm, called AES (Advanced Encryption Standard) to encrypt the files of users. Everyone who has been infected by this threat should read this article to learn how to remove the Fsociety crypto-virus and try to restore encrypted files by it.

Threat Summary


Fsociety Ransomware

Short DescriptionEncrypts user files with AES cipher and RSA key and sets a wallpaper from the famous TV series Mr.Robot.
SymptomsThe user may witness changed wallpaper to an Fsociety mask and they may find their files to be unable to be opened.
Distribution MethodVia an Exploit kit, JavaScript or Trojan.Downloader
Detection Tool See If Your System Has Been Affected by Fsociety Ransomware


Malware Removal Tool

User ExperienceJoin our forum to Discuss Fsociety Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Fsociety Ransomware – How Does It Spread

The creators of the Fsociety ransomware may use a different set of tools to replicate this virus. They may purchase spamming software that may distribute malicious URLs that may infect users using a JavaScript and drive-by-downloads by simply clicking on the URLs. Such URLs may be distributed in different ways, like referral spam, for instance. In addition to this, Fsociety ransomware may spread via malicious e-mail attachments, that are spam e-mails or phishing ones. The files may look like legitimate Microsoft Office documents. However, they are nothing like such, since they are disguised to get affected users to open them.

Fsociety Ransomware – More Information

Similar to Mr. Robot’s second season, Fsociety ransomware, uses strong encryption to hold the files of the victim’s computer hostage until a ransom payoff has been completed. When executed, Fsociety ransomware may drop it’s files in different places and under different names. The most often chosen names by malware writers are:

commonly used file names and folders

In addition to that, Fsociety ransomware is based on the EDA2 ransomware project which is an open source ransomware code uploaded online and created by Utku Sen. Since then, many variants of the EDA2 project have popped up, because all it takes is someone who knows coding to take this source code and design own version of ransomware, just like Fsociety ransomware variant is.

As soon as the Fsociety ransomware has infected a computer, it may begin encrypting files. The Fsociety virus may be pre-programmed to scan for a wide variety of file extensions which it encrypts. Some of those files may be the following:


The encrypted files are enciphered with a powerful AES (Advanced Encryption Standard) encryption and the decryption key for them has been encoded in an RSA (Rivest-Shamir-Adleman).

Related Article: Ransomware Encryption Explained – Why Is It So Effective?

The encrypted decryption key is then sent to the cyber-criminals’ command and control server where they have it along with a unique identification number for every user PC they have infected. After this, the wallpaper of the infected computer is changed to the famous Fsociety logo from the TV series Mr. Robot.

While the inspiration of the malware writers led them to choose a good TV series to base their ransomware on, this threat is one of the worse you can see out there. However, no matter how dire and bad the situation is, malware researchers advise users not to pay any ransom money if they see a ransom note asking them to contact the crooks for a payoff. This is due to several obvious reasons:

  • You support the cyber-criminals by paying the ransom.
  • There is no guarantee that you are going to get your files back.

Remove Fsociety Ransomware and Restore the Encoded Files

The ransomware virus should be removed by following the instructions after this article. Since Fsociety may modify the Windows Registry Editor and in addition to this create multiple files in different locations, malware researchers advise using an advanced anti-malware program to remove it, since it will make sure it is permanently remove without any damage to the encrypted files.

To restore files encrypted by Fsociety ransomware, users are strongly advised to make sure they backup the encrypted files and make copies if they try direct decryption. We have provided some alternatives to try and restore your files in step “3.Restore files encrypted by Fsociety Ransomware” below and advise you to take a look at them. They may not be 100 percent effective but in case you are lucky, haven’t reinstalled your OS and had backups, they may work for you.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website


  1. AvatarAlexis

    Where are the instructions??? Where is part 3???

    1. AvatarMilena Dimitrova



Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share