Remove RandomLocker Ransomware – Restore .rand Files

randomlocker ransomware lock screen note

This article provides information about the ransomware dubbed RandomLocker as well as a step-by-step guide that provides removal and data recovery help.

RandomLocker ransomware is a new threat that compromises computer systems in order to encrypt sensitive data stored on the available hard drives. It appends the extension .rand to all encrypted files and then drops a ransom note that blackmails victims into paying a ransom for the private decryption key. Keep reading and learn how to remove RandomLocker ransomware and restore .rand files.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionRandomLocker ransomware virus encrypts important files on the infected PC and then drops a ransom note to demand payment for the decryption of .rand files.
SymptomsImportant files have the extension .rand appended to their names. The access to them is completely restricted. A ransom note blackmails into ransom payment.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by RandomLocker

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss RandomLocker.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

RandomLocker Ransomware – Distribution Tactics

RandomLocker ransomware infection is triggered by an executable file called Ransomware.exe as releveled by the analysis of its sample. Hackers could use several common methods for the distribution of this executable file. The main one is believed to be email spam campaigns. This method is preferred by bad actors as it allows them to craft email messages in a way that they seem legit and important. Such emails may impersonate representatives of well-known companies (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Gergana Ivanova. Read the original post at: