Remove Like Ransomware – Restore .like Files

This article will aid you to remove Like ransomware effectively. Follow the ransomware removal instructions given below in the article.

Like is a ransomware virus that encrypts your files, while also appends the .like extension to them. The Like virus displays a ransom note message stored in a file called infoinfo.txt. You are demanded to pay a ransom sum payment to supposedly restore your file data. Continue to read below to see how you could try to potentially recover some of your files.

Threat Summary

NameLike Ransomware
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts files on your computer and demands a ransom sum to be paid in the Bitcoin cryptocurrency.
SymptomsThe ransomware will encrypt your files, while placing the .like extension to them, and also put up a ransom note called infoinfo.txt.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Like Ransomware

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Like Ransomware.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Like Ransomware – Infection Spread

Like ransomware might spread its infection with various methods. A payload dropper which initiates the malicious script for this ransomware is being spread around the World Wide Web, and researchers have gotten their hands on a malware sample. If that file lands on your computer system and you somehow execute it – your computer system will become infected.

Like ransomware might also distribute its payload file on social media and file-sharing services. Freeware which is found on the Web (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Tsetso Mihailov. Read the original post at: