Remove Globe 2.0 Ransomware and Decrypt .lovewindows Files - How to, Technology and PC Security Forum |

Remove Globe 2.0 Ransomware and Decrypt .lovewindows Files

globe-ransomware-id-sensorstechforum-ransom-page-768x464The e-mail address “” has been used by one of the latest iterations of the second version of Globe ransomware. This crypto-virus uses the aid of encryption to render any files ineffective and ask a ransom to be paid for the restoration of the encrypted files. First spotted back in October, 2016, the second version has been reported to be decryptable by EmsiSoft researchers. This is the reason we advise you to read this article, learn more about the virus, how to safely remove it and try to restore the encoded files, in case you have been infected by Globe.

Threat Summary

NameGlobe 2.0
Short DescriptionThe ransomware encrypts files with the Blowfish algorithm and asks a ransom payoff for decryption.
SymptomsFiles are encrypted with the extension and become inaccessible. A ransom note with instructions for paying the ransom shows as a text or image file.
Distribution MethodSpam Emails, Email Attachments, File Sharing Networks.
Detection Tool See If Your System Has Been Affected by Globe 2.0


Malware Removal Tool

User ExperienceJoin our forum to Discuss Globe 2.0 Ransomware.

Globe 2.0 Ransomware – More Information

Globe ransomware has many different variants. The virus is generally known as several other iterations, like:

  • Evolved JigSaw ransomware.
  • Variant of the Apocalypse ransomware.
  • Evolved Globe 1.0 Ransomware.

No matter from which variant this malware has arisen, it is no secret that once infected your computer, it aims for only one thing, to cause chaos onto your system.

How Does Globe Infect a Computer

In order to cause an infection on a computer, Globe 2.0 may take advantage of fake Microsoft Office and Adobe documents that are made to seem legitimate to an inexperienced eye. Anyone who directly opens those files, activates a trap-script that aims to infect the computer directly or redirect the user to a web host that will execute an infection code.

What Happens after Infection by Globe 2.0

After the virus has infected a given system, the procedure is downright the same as other variants. The malware is pre-configured to scan for various types of files that are used on a regular basis, for example:

  • Videos.
  • Images.
  • Audio files.
  • Database files.
  • Virtual Machine files.
  • Documents (Microsoft Office or Adobe)

After this, Globe 2.0 encrypts the files, whose file extension and type (.jpg, .mp3, .wmv, .mp4, .docx) both match with the ones it is programmed to scramble. The files can no longer be opened after the encryption process is complete and they may look like the following:


In addition to this, the ransomware may add a text file that is basically the ransom note of Globe 2.0 ransomware and aims to induce fear in unsuspecting victims with the purpose to convince them to pay a hefty ransom fee.

Globe 2.0 Ransomware – What to Do?

Thanks to malware researchers, users do not have to make a ransom payoff and then pray they will receive the files back. Instead, malware researchers have released free decryption tools that will help decrypt the files by Globe ransomware for free. For more information on how to remove Globe 2.0 ransomware and restore .lovewindows file, please visit the related article below:


ATTENTION! Before performing any actual decryption we advise you to follow the removal instructions below or in the related article and also to back up your files and do the restoration on copies of them.


Ventsislav Krastev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share