Remove Everbe 2.0 Ransomware and Restore .divine Files

Remove Everbe 2.0 Ransomware Restore .divine Files sensorstechforum

This is an article that provides specific details on Everbe 2.0 ransomware infection as well as a step-by-step removal followed by alternative data recovery approaches.

As spotted by security researchers a new version of Everbe ransomware has been released in active attack campaigns. Everbe 2.0 is a threat that corrupts computer systems in order to encode valuable data and demand a ransom for its decryption. This time cyber criminals set the crypto virus to append a specific string of extensions that begins with their contact email and ends with the extension .divine. So upon encryption the files are renamed with .[[email protected]].divine extensions and access to the information they store is restricted. In addition a ransom note !=How_to_decrypt_files=!.txt attempts to blackmail you into paying for a decryption tool possessed by hackers.

Threat Summary

NameEverbe 2.0
TypeRansomware, Cryptovirus
Short DescriptionA data locker ransomware that utilizes AES cihper algorithm to encrypt valuable files stored on the infected computer and then demands a ransom for decryption solution.
SymptomsThe access to important files is restricted and all they are renamed with .[[email protected]].divine string of extensions. A ransom message urges victims to contact hackers at [email protected] email address.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Everbe 2.0

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Everbe 2.0.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Everbe 2.0 Ransomware – Distribution

For the distribution of this iteration of (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Gergana Ivanova. Read the original post at: