Decrypt .mail Encrypted files by RotorCrypt Ransomware (Free)

This article is made to help you to explain what exactly are .mail encrypted files on your computer and how to remove the .mail version of RotorCrypt ransomware and how to decrypt encrypted files for free.

Another version of the notorious RotorCrypt ransomware has been released In the wild. The ransomware virus uses the .mail file extension to which it adds several different symbols, making the files look broken. The end goal of this variant of RotorCrypt ransomware is to get victims to pay a hefty ransom fee in order for the victims to have their files decrypted again. If your computer has been infected by this version of RotorCrypt ransomware, read this article to learn how to remove it and recover your files without paying ransom.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionA variant of the RotorCrypt ransomware virus family. Aims to encrypt the files on the infected computers and then ask victims to pay ransom to get them back.
SymptomsFiles are encrypted with an added [email protected] file extension.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss .

.mail Rotor Crypt Virus – Infection and Activityh2>

For this version of RotorCrypt to infect your computer, it’s infection file may be pushed onto your computer as a result of being sent to you via e-mail. Cyber-criminals who infect with ransomware often disguise infection files to pretend to be legitimate types of documents, images and others. The e-mails may pose as if they come from big companies, such as:

  • PayPal.
  • eBay.
  • Any bank.
  • Amazon.
  • DHL.
  • FedEx.

The e-mails may contain the file in an archive and the types of files that may infect your PC are usually (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Vencislav Krustev. Read the original post at: