Remove Rebus (Scarab) Ransomware and Restore .REBUS Files


This article provides information about a version of Scarab data locker ransomware dubbed Rebus. The threat encrypts important files and demands a ransom payment. By reaching the end of the article, you will know how to remove the threat and how to restore .REBUS files.

Rebus is a newly detected ransomware that belongs to the Scarab family. It is classified as data locker ransomware due to its main purpose to locate target files and encode them. Corrupted data can be recognized by the specific extension .REBUS that stands at the end of their names. Hackers behind Rebus ransomware demand a ransom for the decryption of .REBUS files.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionA data locker ransomware that utilizes AES cihper algorithm to encrypt target files stored on the infected computer. Then it demands a ransom for a specific decryption solution.
SymptomsImportant files are locked and renamed with .REBUS extension. The access to the information they store remains restricted until a ransom is paid.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Rebus

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Rebus.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Rebus Ransomware – Distribution

An infection with Rebus ransomware could be triggered by a malicious payload that sneaks into computer systems with the help of various shady techniques of distribution. Preferred by hackers are the email spam campaigns. Crafted emails often attempt to trick users into installing the ransomware directly on their PCs. The malicious (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Gergana Ivanova. Read the original post at: