The ransomware is a type of virus that has become commonplace. The difference that for other types of viruses exist is not an attempt to fool their victims to install new programs or features. The attack is through locks to the existing content access – a kind of data kidnapping, returned upon payment of ransom – which can be a headache if important information is affected.Criminals responsible for ransomware require payment to provide the cryptographic keys of the locked files, which would allow them to be accessed again.
What is ransomware ?
Fortunately, many antivirus companies have studied the most common variations of the attack and havedeveloped tools that allow you to recover the files without having to pay to regain access. Have a virus on your computer is the first step to avoid such problems.
The avg.com/ww-en/ransomware-decryption-tools ) free tools that can be downloaded to eliminate the action of seven different types of attacks., for example, has on its website (
If your device has been infected with a ransomware, the character of each stroke to be able to remove it:
This ransomware was detected in June 2016. In addition to encrypting the files, change their extensions to .encrypted, .FuckYourData, .locked, .Encryptedfile or .SecureCrypted. It also creates new text file that contains information about the victim can do to get them back .
Ransomware encrypts important files and prevents victims access (Reuters / ACG)
Another ransomware that arose in 2016, this time in May. This does not rename the encrypted file, but creates a new html format where payment instructions are displayed to retrieve them.
Bart is a recent ransomware, which appeared in June 2016. One of the symptoms of infected computers is the addition of bart.zip extension to the end of your files, you need passwords to be unlocked. At the same time, changes the wallpaper of the victim for an image that has instructions on how to unlock them.
Malware requires payment to provide file recovery keys (Reuters / AVG)
Also known as Mircop, this ransomware was detected in June 2016 and is characterized by adding the name Lock. the beginning of the encrypted files. Also change the wallpaper of the victim by a number of different images that contains information on how to unlock them.
This adds the terms ._23-06-2016-20-27-23_ $ f_tactics @ aol.com or $ .legion. $ Centurion_legion @ aol.com $ .cbf the end of the infected files, changes the user’s wallpaper and adds a pop-up to inform you that the data was encrypted.
6. SZF Locker
Malware first detected in 2016, he adds .szf extension at the end of the stolen files. When the user attempts to access them, open in its place a message in Polish it with information on how to retrieve them.
This form of ransomware is old, first being detected in February 2015. The Teslacript not rename the files, just displays a message with instructions on how they can be recovered.