Yakes Ransomware - Removal and Decryption Methods - How to, Technology and PC Security Forum | SensorsTechForum.com

Yakes Ransomware – Removal and Decryption Methods

ransomware-virus Ransomware infections continue. Not only are new versions of well-known threats appearing, but also new ransomware cases are registered on a daily basis. One of the latest ransomware threats currently targeting users is dubbed Yakes. According to researchers, Yakes ransomware is spread via spam email attachments. This article aims to help its victims.

Threat Summary

NameYakes Ransomware
TypeRansomware Trojan
Short DescriptionThe ransomware encrypts users’ files and demands a ransom in the amount of 4 Bitcoins.
SymptomsThe user’s files are encrypted and unusable.
Distribution MethodSpam email attachments.
Detection Tool See If Your System Has Been Affected by Yakes Ransomware


Malware Removal Tool

User ExperienceJoin our forum to Discuss Yakes Ransomware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Yakes Ransomware Distribution & Technical Overview

Yakes is, in fact, a ransomware Trojan. It drops a ransom note in all folders containing encrypted data, as reported by Enigma Software researchers. The ransom note is named [date of infiltration]-INFECTION.TXT. As for the ransom message, it contains little information:

Your files are now encrypted. I have the key to decrypt them. I will give you a decrypter if you pay me.

As visible, the ransom note is more of a personal message addressed to the victim. Details about the ransomware are not provided, and from the way the note is written, it seems like the victim is dealing with one cybercriminal.
Two email addresses are provided to victims to contact the cybercriminal(s). If the given emails somehow do not work, the victim is given an option to contact them via BitMessages.

The amount of the ransom demanded by Yakes author(s) is 4 Bitcoins, or $1,811. However, paying the ransom is never a good idea, since the decryption key may never be sent to the victim. Furthermore, it’s safe to say that ransomware is partly successful because of victims’ payments. Continue reading to learn how to try and restore your files via alternative methods.

Yakes Ransomware Removal and File Restoration Methods

An official decryption method for files compromised by Yakes, typically released by security researchers is still awaited. The very first thing you need to do is remove Yakes manually or by running an anti-malware tool. Depending on your skills and knowledge, you can refer to part 1 or part 2 of the removal manual situated below. In the removal manual, you will also find instructions on how to back up your files from now, and how to try and restore your encrypted files via data recovery software.

Manually delete Yakes Ransomware from your computer

Note! Substantial notification about the Yakes Ransomware threat: Manual removal of Yakes Ransomware requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Yakes Ransomware files and objects
2.Find malicious files created by Yakes Ransomware on your PC
3.Fix registry entries created by Yakes Ransomware on your PC

Automatically remove Yakes Ransomware by downloading an advanced anti-malware program

1. Remove Yakes Ransomware with SpyHunter Anti-Malware Tool
2. Back up your data to secure it against infections and file encryption by Yakes Ransomware in the future
3. Restore files encrypted by Yakes Ransomware

Optional: Using Alternative Anti-Malware Tools

Milena Dimitrova

An inspired writer, focused on user privacy and malicious software. Enjoys 'Mr. Robot' and fears '1984'.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.