Remove LanRan v2 Ransomware – Restore .LanRan2.0.5 Files

LanRan ransomware desktop ransom message sensorstechforum

This article provides information about a ransomware dubbed LanRan v2 as well as descriptive steps how to remove its malicious files from the system. The threat encrypts important files and demands a ransom payment. By reaching the end of the article, you will know also which alternative data recovery methods may help you to restore a few to all of the .LanRan2.0.5 files.

New version of LanRan ransomware has been spotted in the wild. The analysis of its samples reveals that this time the threat uses the specific extension .LanRan2.0.5 to mark corrupted files. Like its predecessor, LanRan v2 plagues computer systems in order to locate target data and encrypt it with strong cipher algorithm. At the end of the attack, a ransom message that replaces the desktop wallpaper demands a ransom payment of 0.5 BTC for a decryption solution.

Threat Summary

NameLanRan v2
TypeRansomware, Cryptovirus
Short DescriptionA data locker ransomware that utilizes strong cihper algorithm to encrypt valuable files on stored on the infected computer and extorts a ransom payment from victims.
SymptomsImportant files are locked and marked with .LanRan2.0.5 extension. Ransom message demands a payment of 0.5 BTC for decryption solution.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by LanRan v2

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss LanRan v2.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

LanRan v2 Ransomware – Distribution

An infection with LanRan v2 ransomware is triggered by a malicious (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Gergana Ivanova. Read the original post at: