Scarab-Recovery Virus (Scarab Ransomware) – Remove and Restore .Recovery Files

Scarab-Recovery Virus image ransomware note .Recovery extension

Scarab-Recovery Virus is a newly discovered release of the Scarab ransomware family. It is possible that future versions of it are going to feature updated code that add newer functions. Read our complete Scarab-Recovery Virus removal guide to learn more about it.

Threat Summary

TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts sensitive information on your computer system with the .Recovery extensions and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files with a strong encryption algorithm.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Scarab-Recovery

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Scarab-Recovery.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Scarab-Recovery Virus – Distribution Ways

The Scarab-Recovery virus is being distributed using the familiar tactics associated with the ransomware family. At the moment there is no information about the identity of the hacker or criminal group behind the ongoing attacks. The attack campaigns seeem to be focused on targets on a worldwide scale utilizing the most common spread tactics.

Email phishing messages are constructed in order to fool the recipients into thinking that they are receiving a message from a legitimate Internet service or a well-known company. Instead they are offered the Scarab-Recovery virus files either attached or hyperlinked in the body contents.

Another mechanism that is used by the criminals is the creation of counterfeit download sites — they usually pose as well-known portals or the official vendor download page. Usually they utilize the text, (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum authored by Martin Beltov. Read the original post at: