Remove Matrix Ransomware and Restore .ITLOCK Files

Security reports indicate that a new iteration of the Matrix ransomware has been identified processing the victim files with the .ITLOCK extension.

Our article provides an overview of the virus operations and it also may be helpful in attempting to remove the virus.

Threat Summary

NameMatrix Ransomware
TypeRansomware, Cryptovirus
Short DescriptionThe ransomware encrypts files by placing the .ITLOCK extension on your computer system and demands a ransom to be paid to allegedly recover them.
SymptomsThe ransomware will encrypt your files and leave a ransom note with payment instructions.
Distribution MethodSpam Emails, Email Attachments
Detection Tool See If Your System Has Been Affected by Matrix Ransomware

Malware Removal Tool

User ExperienceJoin Our Forum to Discuss Matrix Ransomware.Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

Matrix Ransomware – Distribution Tactics

The .ITLOCK Matrix ransomware variant is a new custom variant that is derived from the well-known virus family. As such we presume that the hackers are going to use the typical distribution tactics like previous iterations. As there is a fairy low number of found infections we presume that the captured samples are test versions or the initial limited release.

A typical infection will make use of phishing email messages that are designed to imitate well-known Internet sites or services that the users might use. The criminals often use templates for password reset notifications, software updates and other messages that require some kind of a user interaction. The malicious files can be directly attached or linked in the body contents.

Matrix ransomware infections can (Read more...)

*** This is a Security Bloggers Network syndicated blog from How to, Technology and PC Security Forum | authored by Martin Beltov. Read the original post at: