Another ransomware crypto-virus using an AOL email address has attacked unsuspecting users. The ransomware has been dubbed JohnyCryptor because that’s the name used for the email and correspondingly as the extension for encrypted files. The virus locks files and leaves the email with instructions how to contact the ransomware creators. The sum for ransom is not specified. To see how to remove the ransomware and how you could restore your files, you should read the article to the end.
|Short Description||The ransomware encrypts files with an extension ending in [email protected] and demands a ransom to be paid for decryption.|
|Symptoms||The ransomware will encrypt files on your PC. A picture will appear with a message describing how to pay to get a decryptor.|
|Distribution Method||Spam Emails, Email Attachments, Executable Files|
|Detection Tool|| See If Your System Has Been Affected by JohnyCryptor |
Malware Removal Tool
|User Experience||Join Our Forum to Discuss JohnyCryptor.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
JohnyCryptor Ransomware – Distribution Methods
JohnyCryptor ransomware has a few distribution methods. Like other ransomware viruses nowadays, this one also uses spam emails as the main method of distribution. Such emails have attached files which contain the malware code inside of them. Rarely, the body of the email itself could execute the malicious code.
A possibility of getting infected with the ransomware is via social media networks or by using some file-sharing sites. These services could also spread malware inside executable files disguised as useful or needed applications. One of the best ways you can prevent ransomware infections from happening is by avoiding suspicious files. Just do not download, open or even click files you don’t entirely trust.
JohnyCryptor Ransomware – Detailed Information
JohnyCryptor is the name that has been given to a ransomware crypto-virus. The name comes from the email given by its creators for contact. Simply enough, the extension used as an appendix for encrypted files also has an ending with the same name. Not much other information is given by the ransomware or known yet.
The ransomware will encrypt the files found on your hard disc drives and other storage devices. After the process is complete, you will notice that your desktop wallpaper is changed with a new picture. The picture contains instructions on how to contact the ransomware creators. This is how the picture looks like:
The files read the following:
Your computer has been encrypted by cryptographically strong algorithm. All your files are now encrypted. You have only one way to get them back safely – using original decryption tool. Using another tools could corrupt your files, use it on your own risk.
To get original decryptor contact us with email.
It is in your interest to respond as soon as possible to ensure the restoration of your files, because we won’t keep your decryption keys at our servers more than one week in interest of our security.
PS. only in case you do not receive a response from the first email address within 48 hours, please use this alternative email address
The JohnyCryptor virus is very different from recent ransomware. Neither does it specify a price for paying for decryption, nor does it push you to pay in a day or two. Instead, you are given a whole week to do something, and afterward, your files will be just deleted. Although the ransomware creators claim that they will delete files because of security reasons, it sounds more like a threat.
Do NOT contact [email protected] or the alternative email address with thinking of paying any sum of money. Funding criminals can give them the inspiration to do more crimes or make a worse kind of ransomware variant for JohnyCryptor. No guarantee exists that you will get your files back or if you are going to be given a decryptor at all.
The JohnyCryptor ransomware encrypts different kinds of files. The aim of encryption is probably pictures and documents as those files are precious to users. That is due to the fact that usually such files preserve memories or valuable information for the users. The JohnyCryptor ransomware ransomware encrypts these file extensions:
→.jpg, .jpg2, .png, .ppt, .pptm, .pptx, .bmp, .doc, .docm, .docx, .docxml, .pdf, .gif, .rtf, .tar, .targz, .targz2, .txt, .xlmv, .xls, .xlsm, .xlsx, .xml, .mkv, .mov , .mp4, .mpeg, .mpg, .msg, .myd, .myi, .obj, .odb, .odc, .odm, .ods, .oft,. one, .onepkg, .onetoc2, .opt, .oqy, .p7b, .p7c, .pcx, .pdd, .pdp, .pem, .pfx, .php, .php3, .php4, .php5, .phtml, .pl, .pm, .pot, .potm, .potx, .pps, .ppsn, .prn, .pst, .ptx, .pxr, .py, .ai3, .ai4, .ai5, .ai6, .arw, .as, .ASA, .ascx, .asmx, .asp, .aspx,. asr, .avi, .bak, .bay, .bz2, .c, .cdr, .cer, .cfc, .cfn, .cfnl, .cin, .chm, .class, .config, .cpp, .crt, .cs, .css, .csv, .cub, .dae, .db, .dc3, .dcm, .der, .dic, .dif, .divx, .djvu, .dl, .dot, .dotm , .dotx, .dpx, .dqy, .dtd, .dwg, .dx, .dxf, .dsn, .dwt, .eps, .exr, .fido,. frm, .gz, .h, .hpp, .hta, .htc, .htm, .html, .icb, .ics, .iff, .inc, .ind, .ini, .iqy, .j2c, .i2k, .java, .jp2, .jpc, .jpf, .jpx, .js, .jso, .json, .kmz, .lbi, .m4v, .mdb, .mdf, .mef , .mht, .mhtml, .r3d, .rar, .rdf, .rle , .rqy, .rss, .rw2, .rwl, .sct, .sdpx, .shtm, .shtml, .slk, .sln, .sql,. srw, .ssi, .stn, .svg, .svg2, .swf, .tdi, .tga, .tld, .u3d, .udl, .uxdc, .vcs, .vda, .wbm, .wbmp, .xlk, .xlm, .xltx, .xlw, .xsd, .xsl, .xsc, .xslt, .xz, .wb2, .wim , .wmv, .zip, .3fr, .3gp, .7z
The list of file extensions given above may be incomplete, but those are the files which will get encrypted. When the encryption process is finished, all files will have this extension appended – .id-[Your ID number][email protected].
JohnyCryptor ransomware could delete Shadow Volume Copies inside the Windows Operating System. It is recommended that you do a check for this, as you might have a different version of the ransomware that has left the Shadow backups of your system intact.
Remove JohnyCryptor Ransomware and Restore [email protected] Files
If your computer is infected with the JohnyCryptor ransomware, you should have some experience in removing viruses. You should get rid of this ransomware as fast as you can before it spreads further via the network and infects more files. You should remove the ransomware and follow the step-by-step instructions given below.