This article explains the issues that occur in case of infection with .godes files virus and provides a complete .godes virus removal guide. When following the steps below you will also find how to potentially recover .godes files.
When you cannot valuable files and they are all marked with the extension .godes you are a victim of nasty ransomware infection. As reported by security researchers the so-called .godes files virus is a strain of the notoriousSTOP ransomware. It is a threat designed to disrupt computer security in order to locate certain types of files and encode them with sophisticated cipher algorithm. The main goal of .godes virus is to blackmail you into transferring ransom to cybercriminals. That’s why it drops a ransom message file (_readme.txt) once it finishes the encryption phase.
In the event that your computer has been infected by .godes files virus, you should remove all malicious files and objects before being able to use it safely again.
|Name||.godes Files Virus|
|Short Description||A version of the STOP/DJVU ransomware that is designed to encrypt valuable files stored on infected computers and then extort a ransom from victims.|
|Symptoms||Important files are encrypted and renamed with the extension .godes|
A ransom message forces victims to contact hackers in order to receive instructions on how to pay a ransom ($490 – $980).
|Distribution Method||Spam Emails, Email Attachments|
|Detection Tool|| See If Your System Has Been Affected by .godes Files Virus |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss .godes Files Virus.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
.godes Files Virus – Update July 2019
The good news for all victims of STOP .godes ransomware is that the security researcher Michael Gillespie found weaknesses in the code of this variant and released an updated version of his STOP ransomware decrypter.
So the moment you remove all malicious files and objects from your infected system you can enter our data recovery guide where you will find a download link for the free .godes decryption tool and learn how to proceed with the decryption process.
Have in mind that the tool is designed to support specific offline IDs, so it may not be effective for all occasions of .godes ransomware infections.
.godes Files Virus – Infection Overview
Security researchers reported that the .godes files virus is a strain of the infamousSTOP ransomware. STOP ransomware is a threat intended for ransom extortion. Hence, it attacks computer systems with the primary goal to encrypt personal files and restricts the access to the data they store.
Typically, ransomware infections like .godes are spread via well-known techniques like malvertising, malspam, website corruption, freeware installers, and fake software updates. The most preferred one is usually malspam. It is realized via massive spam email campaigns that attempt to deliver the malicious code. Below you could see a list of some of their typical components. Once you notice them you may prevent falling victim to malware infection.
For the delivery of malicious code may be used:
- URL address presented as button, direct link, in-text link, image, etc.
- File attachment presented as invoice, order ID, purchase details, coupon, special offer, and even legal paper
- The name of a representative of a well-known brand, service, financial or governmental institution
The name .godes files virus originates from the specific extension which the ransomware appends to encrypted files. So a sure trait that a file is corrupted by STOP .godes ransomware is the presence of the extension .godes at the end of its name. Since the encryption is performed with the help of sophisticated cipher algorithm, all .godes files remain inaccessible until their code it reverted back to its original state.
As a result, the ransomware attempts to blackmail you into paying a ransom in cryptocurrency to cybercriminals. The extortion is realized via ransom message which is stored in the file _readme.txt
A copy of .godes files virus‘ ransom message (_readme.txt):
Don’t worry, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest
encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that’s price for you is $490.
Please note that you’ll never restore your data without payment.
Check your e-mail “Spam” or “Junk” folder if you don’t get answer more than 6 hours.
To get this software you need write on our e-mail:
Reserve e-mail address to contact us:
Our Telegram account:
Your personal ID:
According to the details presented in the ransom message, when you pay the ransom you will receive a decryption tool for encrypted files. However, since there is no guarantee that this tool is functioning, we recommend you to avoid any negotiations with cybercriminals and attempt to solve the problem in a secure way.
Remove .godes Files Virus and Restore Data
The so-called .godes files virus is a threat with highly complex code that plagues the whole system in order to encrypt personal files. Hence the infected system could be used in a secure manner again only after the complete removal of all malicious files and objects created by .godes ransomware. That’s why we recommend that all steps presented in the .godes removal guide below should be completed for the sake of your system and data security. Beware that the manual ransomware removal is suitable for more experienced computer users. If you don’t feel comfortable with the manual steps navigate to the automatic part of the guide.