Ransomware infections continue. Not only are new versions of well-known threats appearing, but also new ransomware cases are registered on a daily basis. One of the latest ransomware threats currently targeting users is dubbed Yakes. According to researchers, Yakes ransomware is spread via spam email attachments. This article aims to help its victims.
|Short Description||The ransomware encrypts users’ files and demands a ransom in the amount of 4 Bitcoins.|
|Symptoms||The user’s files are encrypted and unusable.|
|Distribution Method||Spam email attachments.|
See If Your System Has Been Affected by Yakes Ransomware
Malware Removal Tool
|User Experience||Join our forum to Discuss Yakes Ransomware.|
|Data Recovery Tool||Windows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.|
Yakes Ransomware Distribution & Technical Overview
Yakes is, in fact, a ransomware Trojan. It drops a ransom note in all folders containing encrypted data, as reported by Enigma Software researchers. The ransom note is named [date of infiltration]-INFECTION.TXT. As for the ransom message, it contains little information:
Your files are now encrypted. I have the key to decrypt them. I will give you a decrypter if you pay me.
As visible, the ransom note is more of a personal message addressed to the victim. Details about the ransomware are not provided, and from the way the note is written, it seems like the victim is dealing with one cybercriminal.
Two email addresses are provided to victims to contact the cybercriminal(s). If the given emails somehow do not work, the victim is given an option to contact them via BitMessages.
The amount of the ransom demanded by Yakes author(s) is 4 Bitcoins, or $1,811. However, paying the ransom is never a good idea, since the decryption key may never be sent to the victim. Furthermore, it’s safe to say that ransomware is partly successful because of victims’ payments. Continue reading to learn how to try and restore your files via alternative methods.
Yakes Ransomware Removal and File Restoration Methods
An official decryption method for files compromised by Yakes, typically released by security researchers is still awaited. The very first thing you need to do is remove Yakes manually or by running an anti-malware tool. Depending on your skills and knowledge, you can refer to part 1 or part 2 of the removal manual situated below. In the removal manual, you will also find instructions on how to back up your files from now, and how to try and restore your encrypted files via data recovery software.
Manually delete Yakes Ransomware from your computer
Note! Substantial notification about the Yakes Ransomware threat: Manual removal of Yakes Ransomware requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.