Zyka Ransomware – Remove and Restore .lock Files
THREAT REMOVAL

Zyka Ransomware – Remove and Restore .lock Files

OFFER

SCAN YOUR PC
with SpyHunter

Scan Your System for Malicious Files
Note! Your computer might be affected by Zyka and other threats.
Threats such as Zyka may be persistent on your system. They tend to re-appear if not fully deleted. A malware removal tool like SpyHunter will help you to remove malicious programs, saving you the time and the struggle of tracking down numerous malicious files.
SpyHunter’s scanner is free but the paid version is needed to remove the malware threats. Read SpyHunter’s EULA and Privacy Policy

The article will help you remove Zyka ransomware efficiently. Follow the ransomware removal instructions at the end of this article.

Zyka is a ransomware cryptovirus. Your files will become encrypted and receive the extension .lock when the encryption process is complete. Malware researchers believe that the AES encryption algorithm is used for locking the files. The Zyka cryptovirus will leave a ransom note with demands for payment, with a Guy Fawkes mask as a background. Continue to read below to see how you could try to restore some of your data.

Update! There is now a decryptor tool for this ransomware! The tool was created by the malware researcher Michael Gillespie and can be downloaded from the following link, wrapped inside a .zip archive: StupidDecrypter.

Threat Summary

NameZyka
TypeRansomware
Short DescriptionThe ransomware encrypts files on your computer and displays a ransom message afterward.
SymptomsThe ransomware will encrypt your files and put the extension .lock on your files after it completes its encryption process.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Zyka

Download

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Zyka.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Zyka Ransomware – Infection

Zyka ransomware could spread its infection via different methods. The payload file that initiates the malicious script for this ransomware, that in turn infects your computer system can be circling the Internet at the moment of writing this article.

Zyka ransomware might also distribute its payload file on social media and file-sharing networks. Freeware found on the Web can be presented as helpful but could also hide the malicious script for this cryptovirus. Don’t open files right after you have downloaded them, especially if they come from dubious sources like links and emails. Instead, you should scan them beforehand. Run a scan with a security tool, while also checking the size and signatures of the files for anything unusual. You should read the tips for ransomware prevention thread in the forum.

Zyka Ransomware – Description

Zyka ransomware is also a cryptovirus. Some malware researchers think that the virus might be written with Visual Basic. The extension .lock is to be appended to all files that become locked after the encryption process finishes.

Zyka ransomware could make entries in the Windows Registry to achieve persistence, launch and repress processes in Windows. Some entries are designed in a way that will start the virus automatically with each launch of the Windows Operating System.

The ransom note will appear right in the middle of the encryption process. The note is written in English and gives details about what the ransom is, along with other instructions about what it will take to restore your files. The note’s background is a Guy Fawkes’ mask, which has been used by other ransomware developers. You can view the ransom message that loads after file encryption down here:

That ransom note reads the following:

You are the victim of Zyka
Your important files encryption produced on this computer: photos, videos, documents etc. Here is a complete list of encrypted files, and you can personally verify this.
Encryption was produced using a unique public key AES that generated for this computer. To decrypt your files you need to obtain the private key.
The single copy of the private key, which will allow you to decrypt the files, located on a secret server on the Internet, the server will destroy the key after 72 hours.
After that nobody and never will be able to restore files.
To obtain the private key for this computer which will automatically decrypt files, you need to pay 170 USD /170 EUR to the bitcoin wallet below.
1GmGBH9ra2dqA8CgRg8a8Rngx4qHb2hLDW
It you do not have bitcoins you can buy them from localbitcoins.com
Thank you!
Unlock Freely 150 files

The note of the Zyka ransomware states that your files are encrypted with the AES encryption algorithm. A ransom sum of 170 USD/EUR is asked as payment for unlocking your data. You are given 72 hours by the ransom criminals to unlock your files. You should NOT in any circumstance pay the cybercriminals. Your files may not get restored, and nobody could give you a guarantee for that. Furthermore, giving money to these criminals will likely motivate them to create more ransomware or do other criminal acts.

No list with file extensions that the Zyka ransomware seeks to encrypt is available yet, but files with the following extensions are the most viable to get encrypted:

→.7z, .bmp, .doc, .docm, .docx, .html, .jpeg, .jpg, .mp3, .mp4, .pdf, .php, .ppt, .pptx, .rar, .rtf, .sql, .tiff, .txt, .xls, .xlsx, .zip

Every file that gets encrypted will receive the same extension appended to every one of them, and that is the .lock extension.

The Zyka cryptovirus is quite likely to delete the Shadow Copies from the Windows operating system by utilizing the following command:

→vssadmin.exe delete shadows /all /Quiet

Read on through and check out what type of ways you can try to potentially restore some of your data.

Remove Zyka Ransomware and Restore .lock Files

If your computer got infected with the Zyka ransomware virus, you should have a bit of experience in removing malware. You should get rid of this ransomware as quickly as possible before it can have the chance to spread further and infect other computers. You should remove the ransomware and follow the step-by-step instructions guide provided below.

Note! Your computer system may be affected by Zyka and other threats.
Scan Your PC with SpyHunter
SpyHunter is a powerful malware removal tool designed to help users with in-depth system security analysis, detection and removal of threats such as Zyka.
Keep in mind, that SpyHunter’s scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter’s malware removal tool to remove the malware threats. Read our SpyHunter 5 review. Click on the corresponding links to check SpyHunter’s EULA, Privacy Policy and Threat Assessment Criteria.

To remove Zyka follow these steps:

1. Boot Your PC In Safe Mode to isolate and remove Zyka files and objects
2. Find files created by Zyka on your PC

Use SpyHunter to scan for malware and unwanted programs

3. Scan for malware and unwanted programs with SpyHunter Anti-Malware Tool
4. Try to Restore files encrypted by Zyka

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...