Remove RotorCrypt (PATAGONIA92@TUTANOTA.COM) Ransomware + Decrypt Files

This article provides information on how to remove easily remove RotorCrypt ([email protected]) ransomware and how to restore encrypted files without paying the ransom.


Another version of RotorCrypt data locker ransomware associated with the contact email [email protected] has been spotted by security researchers. The threat plagues computer systems with the main purpose to encrypt important files and demand a ransom payment. A ransom note file called HELP urges victims to contact a presented email address.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionA data locker ransomware that utilizes strong cihper algorithm to encrypt predefined types of files stored on the infected computer. Then it demands a ransom for decryption solution.
SymptomsFiles that store important data are locked and a ransom is demanded for their decryption.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by RotorCrypt

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss RotorCrypt.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Distribution of RotorCrypt Ransomware

Malicious intenders can spread the infection code of RotorCrypt with the help of several methods. The most common method used for the delivery of this nasty infection is supposed to be massive spam email campaigns. Email messages are a really convenient way for hackers to trick as many users as possible to infect their system with the ransomware. This usually happens by the use of malicious file attachments or in-text links. Both elements may trigger the ransomware infection process after an interaction with them. In order to make users more (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Gergana Ivanova. Read the original post at: