Malware researchers have just spotted [email protected] ransomware virus to infect users and encrypt their files asking for a payment in exchange for a decryption key.
We strongly advise users to not pay the cyber criminals as this is not a guarantee they will receive their files back. What’s more, ransomware viruses have gained power in the last year precisely due to panicked and negligent users who hurry to pay as they do not take precautions to prevent such attacks on the first place.
If you have been infected by [email protected], read further to learn how to remove it from your PC first. Only then can you try to restore some of your data using a powerful file recovery tool.
|Short Description||Part of the “@” ransomware variants. Encrypts the files on the infected computer then asks for ransom money in email correspondences.|
|Symptoms||The user may witness his files to become inaccessible and with an .xtbl extension added to them.|
|Distribution Method||Via Spam emails,corrupted file attachments and URLs.|
|Detection Tool|| See If Your System Has Been Affected by [email protected] |
Malware Removal Tool
|User Experience||Join our forum to Discuss [email protected].|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
[email protected] Ransomware – How Does It Spread?
[email protected] spreads like a typical ransomware virus – via spam emails often disguised as legitimate senders such as institutions, organizations, companies, etc. that the victim is well familiar with.
The spam emails that carry the virus usually contain a malicious URL or an attachment, and once opened, the virus enters the victim’s computer and the activation begins.
[email protected] Ransomware in Details
Once inside the victim’s computer, [email protected] ransomware virus will scan the system to look for the following files to encrypt:
It may then drop a file with instructions on how the ransom fee must be paid. The creators behind [email protected] are prompting the victim to email them in order to negotiate the ransom fee.
[email protected] will use a strong AES encryption algorithm to encrypt files. That algorithm is also used to produce a decryption key once the whole encryption process is complete. That decryption key, on the other hand, is encrypted via RSA encryption, and is sent to the cyber criminals empowering them to decrypt the victim’s files upon payment.
How to Remove [email protected] and Restore Encrypted Files
First thing you need to do if your system has been infected by [email protected] is to remove it using a powerful anti-malware tool which will detect all malicious components and remove them safely and permanently from your PC.
You can also follow the steps below to remove [email protected] by yourself.
To learn how to decrypt your files, please check step “3. Restore files encrypted by [email protected]” below.