Seven types of popular ransomware and how to get rid of them on your PC

The ransomware is a type of virus that has become commonplace. The difference that for other types of viruses exist is not an attempt to fool their victims to install new programs or features. The attack is through locks to the existing content access – a kind of data kidnapping, returned upon payment of ransom – which can be a headache if important information is affected.Criminals responsible for ransomware require payment to provide the cryptographic keys of the locked files, which would allow them to be accessed again.

What is ransomware ?

Fortunately, many antivirus companies have studied the most common variations of the attack and havedeveloped tools that allow you to recover the files without having to pay to regain access. Have a virus on your computer is the first step to avoid such problems.

The AVG , for example, has on its website ( avg.com/ww-en/ransomware-decryption-tools ) free tools that can be downloaded to eliminate the action of seven different types of attacks.

If your device has been infected with a ransomware, the character of each stroke to be able to remove it:

1. Apocalypse

This ransomware was detected in June 2016. In addition to encrypting the files, change their extensions to  .encrypted, .FuckYourData, .locked, .Encryptedfile or .SecureCrypted. It also creates new text file that contains information about the victim can do to get them back .

Ransomware encrypts important files and prevents victims access (Reuters / ACG)

Ransomware encrypts important files and prevents victims access (Reuters / ACG)

2. Badblock

Another ransomware that arose in 2016, this time in May. This does not rename the encrypted file, but creates a new html format where payment instructions are displayed to retrieve them.

badblock

Criminals require payments BitCoins to release encrypted files (Reuters / AVG )

3. Bart

Bart is a recent ransomware, which appeared in June 2016. One of the symptoms of infected computers is the addition of bart.zip extension to the end of your files, you need passwords to be unlocked. At the same time, changes the wallpaper of the victim for an image that has instructions on how to unlock them.

bart-ransomware

Malware requires payment to provide file recovery keys (Reuters / AVG)

4. Cript888

Also known as Mircop, this ransomware was detected in June 2016 and is characterized by adding the name Lock. the beginning of the encrypted files. Also change the wallpaper of the victim by a number of different images that contains information on how to unlock them.

cript888

Malware uses threats to cause victims to pay for files (Reuters / AVG)

5. Legion

This adds the terms ._23-06-2016-20-27-23_ $ f_tactics @ aol.com or $ .legion. $ Centurion_legion @ aol.com $ .cbf the end of the infected files, changes the user’s wallpaper and adds a pop-up to inform you that the data was encrypted.

TechTudo application : get tips and tech news on your mobile
legion

Infection change system settings such as wallpapers (Reuters / AVG)

6. SZF Locker

Malware first detected in 2016, he adds .szf extension at the end of the stolen files. When the user attempts to access them, open in its place a message in Polish it with information on how to retrieve them.

7. Teslacript

This form of ransomware is old, first being detected in February 2015. The Teslacript not rename the files, just displays a message with instructions on how they can be recovered.

teslacript

Ransomware requires use of the Tor browser to prevent tracking (Reuters / AVG)

via AVG

Leave your vote

0 points
Upvote Downvote

Total votes: 0

Upvotes: 0

Upvotes percentage: 0.000000%

Downvotes: 0

Downvotes percentage: 0.000000%

Hey there!

Sign in

Forgot password?
Close
of

Processing files…