How to Decrypt Files For Free (CryptConsole Virus)

This article has been created to help you remove the [email protected] variant of CryptConsole ransomware and show you how you can decrypt files that have been encrypted by this ransomware on your computer.

A new variant of the CryptConsole ransomware virus has been detected by cybersecurity researchers. The malawre now uses the e-mail [email protected] as a name of the files, that are encrypted by it, however it still drops the same README.txt ransom note on the computers of victims to convince them into paying ransom to get the encrypted files to work again. Unfortunately for the cyber-criminals, the ransomware is now decryptable and you can recover your files for free if you keep reading this article.

Threat Summary

Name[email protected] Files Virus
TypeRansomware, Cryptovirus
Short DescriptionAims to encrypt the files on the victim’s computer and then set a random file name, which includes the e-mail [email protected]
SymptomsFiles are no longer openable and are renamed plus contain the [email protected] file extension and a README.txt ransom note, asking victims to pay hefty ransom in BitCoin to get the files decrypted and working.
Distribution MethodSpam Emails, Email Attachments, Executable files
Detection Tool See If Your System Has Been Affected by [email protected] Files Virus

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss [email protected] Files Virus.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

[email protected] Files Virus –How Does It Infect

This variant of CryptConsole ransomware may use more than one methods to find itself on the computers of victims. The main method which is used (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Vencislav Krustev. Read the original post at: