Remove Globe2 Ransomware and Decrypt .Encrypted Files - How to, Technology and PC Security Forum | SensorsTechForum.com

Remove Globe2 Ransomware and Decrypt .Encrypted Files

globe-ransomware-id-sensorstechforum-ransom-pageA ransomware using the .raid10, .blt, .globe, .encrypted, [email protected] file extensions and believed to be a variant of JigSaw crypto viruses has been reported to cause new infections in a second, updated version. The updated version of globe uses the not so often met Blowfish encryption to encipher the files of computers that have been infected with it, adding the abovementioned file extensions to them. The virus was first detected in October 2016 and shortly after being spotted EmsiSoft researchers successfully managed to create a free decrypter for it. This is why we strongly advise users not to pay any ransom to cyber-criminals and follow the instructions in this article to remove Globe2 ransomware and decrypt the enciphered files free of charge.

Threat Summary

NameGlobe2
TypeRansomware
Short DescriptionThe ransomware encrypts files with the Blowfish algorithm and asks a ransom payoff for decryption.
SymptomsFiles are encrypted with the extensions .raid10, .blt, .globe, .encrypted, [email protected] and become inaccessible. A ransom note with instructions for paying the ransom shows as a YOU CAN LOSE YOUR DATA file.
Distribution MethodSpam Emails, Email Attachments, File Sharing Networks.
Detection Tool See If Your System Has Been Affected by Globe2

Download

Malware Removal Tool

User ExperienceJoin our forum to Discuss Globe2 Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Globe2 Ransomware – Technical Background

Being reported as a variant of the JigSaw ransomware and also known as Purge the first variant of the globe virus was decrypted very fast. However, this new version may have nothing in common with the first one. This is primarily because it uses the Blowfish encryption to encipher the files of the affected computers. Similar to the 1st version of Globe this virus is also believed to be widespread via unfamiliar phishing e-mails that pretend to be legitimate ones. The e-mails may contain either malicious web links or attachments that resemble legitimate Microsoft Office or Adobe Reader files. Once opened, the user may be infected with the help of an exploit kit.

After already been infected by Globe2, the virus may create one or more malicious files in the following Windows locations:

  • %AppData%
  • %Roaming%
  • %SystemDrive%
  • %User’s Profile%

The files may contain different names. The names may be completely random but they may also resemble a legitimate Windows process, such as svchost, notepad or others.

After having infected the computer, Globe2 may begin the encryption process. The virus may target important files that are opened regularly, such as photos, audio files, Microsoft Office documents, .pdf files as well as others.

The encrypted files may have one of the file extensions mentioned in the table above and they might look like the following.

encrypted-files-globe2-ransomware-sensorstechforum

After having enciphered the files on the computer it has infected, Globe2 adds a file that is named “YOU CAN LOSEYOUR DATA”.

The file leads to a screen with a custom decryption key and the following brief message:

“All server data encrypted!
All server data is encrypted.
To recover your data you need to pay for decryptor.
Contacts
[email protected]
Email [email protected]

Thankfully, users do not have to follow any of those instructions because a decryptor has now been released for this ransomware variant as well. We have prepared the instructions below to help you firstly remove Globe2 ransomware from your computer after which decipher your files for free.

Globe2 Ransomware Removal Instructions

In order to remove this virus firstly, you can try either the Manual instructions or the Automatic ones in case you are not tech savvy. Be sure to know that reverse engineers and security experts always recommend scanning your computer with an advanced anti-malware software for maximum effectiveness during removal.

Manually delete Globe2 from your computer

Note! Substantial notification about the Globe2 threat: Manual removal of Globe2 requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Globe2 files and objects
2.Find malicious files created by Globe2 on your PC

Automatically remove Globe2 by downloading an advanced anti-malware program

1. Remove Globe2 with SpyHunter Anti-Malware Tool and back up your data

Globe2 Ransomware Decryption Instructions

In order to successfully decrypt files enciphered by globe ransomware you are going to need several details to begin with. First, you will need an original file and an encrypted file.

encrypted-file-original-file-globe-ransomware-sensorstechforum

In case you cannot find one, make sure to browse through the default wallpaper folder of the same version of your Windows OS. Here is an example of the location of the default folders for wallpapers for different Windows versions:

C:\Windows\Web\Wallpaper
C:\Users\UserProfile\Pictures
C:\Users\UserProfile\Sample Pictures

After having located an original and an encrypted file, make sure to download the decrypter by clicking on the download button below:

Make sure to save the decrypter somewhere easy to find and open it. Then follow the steps below:

Step 1: Drag and drop the encrypted file and the original file together into the decrypter, like the animated image below demonstrates:

globe2-ransomware-drag-drop-filess

Step 2: The decrypter will begin a brute forcing sequence. Simply wait until your key has been discovered:

decrypt-globe2-instructions-bruteforcing-key-sensorstechforum

2-i-1-nemucod-key-found-globe2-sensorstechforum

Step 3: After this, click on OK and the main interface of the decrypter should appear. From it, choose Add Files to add all the files that you wish to be deciphered.

3-globe2-main-ninterface-sensorstechforum-1

Step 4: After you have added your files, click on the Decrypt button so that the decrypter can begin the deciphering operation.

6-globe2-decrypt-files-sensorstechforum

At this point you will begin to see on the live feed at the middle of the decrypter’s interface which files were successfully decoded:

4-decrypted-files-globe2-sensorstechfrum

Globe2 Ransomware – The Bottom Line

As a summary of this virus, it is nothing special since malware researchers have managed to almost immediately decode it. But bear in mind that there are many other dangerous ransomware viruses out there that exist for couple of years now and no decryption solution has been released yet. This is why it is always a benefit to know how to protect yourself from malware of the file encryption type.

We have prepared several simple tips that you can follow and stay safe in the future:

Tip 1: Make sure to read our general protection tips and try to make them your habit and educate others to do so as well.
Tip 2: Install an advanced anti-malware program that has an often updated real-time shield definitions and ransomware protection.

Tip 3: Seek out and download specific anti-ransomware software which is reliable.

Tip 4: Backup your files using one of the methods in this article.

Tip 5: : Make sure to use a secure web browser while surfing the world wide web.

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.