This article has been created to help you remove the [email protected] variant of CryptConsole ransomware and show you how you can decrypt files that have been encrypted by this ransomware on your computer.
A new variant of the CryptConsole ransomware virus has been detected by cybersecurity researchers. The malawre now uses the e-mail [email protected] as a name of the files, that are encrypted by it, however it still drops the same README.txt ransom note on the computers of victims to convince them into paying ransom to get the encrypted files to work again. Unfortunately for the cyber-criminals, the ransomware is now decryptable and you can recover your files for free if you keep reading this article.
|Name||[email protected] Files Virus|
|Short Description||Aims to encrypt the files on the victim’s computer and then set a random file name, which includes the e-mail [email protected]|
|Symptoms||Files are no longer openable and are renamed plus contain the [email protected] file extension and a README.txt ransom note, asking victims to pay hefty ransom in BitCoin to get the files decrypted and working.|
|Distribution Method||Spam Emails, Email Attachments, Executable files|
|Detection Tool||See If Your System Has Been Affected by [email protected] Files Virus|
[email protected] Files Virus –How Does It Infect
This variant of CryptConsole ransomware may use more than one methods to find itself on the computers of victims. The main method which is used (Read more...)
*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Vencislav Krustev. Read the original post at: https://sensorstechforum.com/decrypt-heinekentuta-io-files-free-cryptconsole-virus/