Remove Embrace Ransomware – Restore .embrace Files

Remove Embrace Ransomware Restore .embrace Files

This article provides information about a ransomware dubbed Embrace that uses an extension of the same name .embrace to mark encrypted files. At the end of it, you will find a step-by-step guide that helps for the removal of this threat as well as alternative ways to recover corrupted files.

Embrace is a newly detected data locker ransomware that targets specific files to encrypt them. With this action, it restricts the access to the information they store. The ransomware is designed to append the extension .embrace to all files it corrupts. As a typical crypto virus, Embrace blackmails victims into paying a ransom for their encrypted files. According to the ransom message associated with the threat, victims should contact hackers at [email protected] to receive further details on the ransom payment.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionEmbrace ransomware encrypts important files stored on the infected host and then demands a ransom for a decryption key.
SymptomsThe ransomware encrypts your files with strong encryption algorithm. All locked files have the extension .embrace appended at the end of their names. A ransom payment is demanded for their decryption.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Embrace

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Embrace.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Embrace Ransomware – Distribution

One of the executable files detected to trigger an infection with Embrace ransomware is identified as malicious by 31 antivirus engines of total 65 all listed on VirusTotal website. (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Gergana Ivanova. Read the original post at: