Protect Your PC From JosepCrypt (Restore .josep Files)

JosepCrypt is a crypto-virus that encrypts files on the target PC and demands ransom to be paid by the victim to free the files.  It may attack any sort of window’s OS like Vista, Windows 7, Win 8 and Win 10. Once installed, this Ransomware uses strong encryption algorithm combination of RSA-2048 key and AES CBC 256-bit. This means files are locked with public and private key. Thus users are left with no option except to pay the ransom and get their fiels back. JosepCrypt may drop malicious payloads and entries in the windows’s registry to auto-launch its program. It searches for various important files like Documents, PDF, photos, music, videos, databases, etc to encrypt them. After encrypting the files, the ransomware changes the desktop wallpaper to ransom note:

The ransom Note says:

Your files have been encrypted ransomware!

Your personal Id:

ZiaDEo7y1ozgwP2TPZEfcJI1qT9LhkW4fzw3x99f8dzcyHS/8qh5T48JPJms43R5px+4F+fM103pbs2pVArVrb
+6LgFwO1EaT0ymfwDTvljHCG4/Dtdqrh3o9yIunXGquFhv+Tlntj3i170Fg238FjlLjlxPB+5p6eCD6JDTeKBrlq
+9kQLxoHyPQ75HBxztchmYiYy4hf5bJQjzpqnIJP7mX/HDVWz09WeYvYR8jdRb0YRWLGpR8jn9fymdfGNhDfivzticdix
+BE/8dtg/bPTA1hD3TuJa/iGGzVVnsmFx2mdT71A80fkj8o4CY9jFXkoQS1RN7IOMpIfo/iEIg+
+ZnItRlJfMTE4MzMzOV8xMC4WLjIuMTVfymx1dDFfMTI5M22iZjE4ZjgwODJjOWFhYTVhOTVkMzljzju0Y2E

LICENSE AGREEMENT

JosepCrypt ransomware is a free open source software.
The program is designed to test the protection of OS Windows against ransomware.
The developer of this software is not responsible for any damage caused by the program.
The program is experimental and the entire responsibility for use lies with the user.

HOW TO USE:
To decrypt your files, you need the program .josep _decryptor.exe
In the letter, send your personal id and two small encrypted files for trial decryption.

If you dont get answer from blackzd@derpymail.org or blackzd@xmail.net in 72 hours,
you need to install tor browser, you can download it here:
https://www.torproject.org/download/download.html.en
After installation, open the tor browser to website:
http://mail2tor2zyjdctd.onion/register.php
Register on the site a new email address and write to us with his letter to our address:
.josep@mai12tor.com

NN: 506358115267996

If you are among the one being a victim of “JosepCrypt ransomware”, then we would strongly suggest you not to pay any ransom to illegitimate persons behind it. Because even after paying they are not going to give your files back. So it is urged that you must opt for removal solutions for JosepCrypt ransomware and try to recover files by automatic data recovery tool or any backup copy if you have.

immune_download_log

Continue reading

Protect Your PC From FBLocker Ransomware (Complete Removal Method)

If you ever encounter your computer pops up a message saying “Your Computer has been Blocked”, then consider it as a serious note as this Virus is a ‘Ransomware’.

FBLocker is a new Facebook-themed Ransomware that encrypts the data on the target PC using .facebook file extension. This Ransomware is usually distributed via spam e-mails, suspicious websites, torrents, P2P network and free software offering. Once your computer is infected, it will quickly sneak into and execute in the system process without the knowledge of the user.The encrypted files are no more accessible by the users. But the main intention of the ransomware is not only demand ransom but is more like showing hate towards the Facebook social networking site. This is because the reason FBLocker ransomware does not save any decryption key for the encrypted files. It uses multi-layer encryption process to generate a separate key for each encrypted files, so that the victims have no any option to recover the files even after paying the ransom.

The payload of FBLocker ransomware is distributed by the name of genuine windows file “SvcHost.exe” file. You can get this infection through spam mail attachments that appear on your inbox subjected as “URGENT” or “IMPORTANT”. The spammers may also use the name of genuine companies like Microsoft or any invoice from Amazon. Users quickly believe on such spams and click on the attachment to download on their PC.
Not only that, the fake version of SvcHost.exe file is also disguised in the name of Windows updates which is absolutely fake. You may receive pop-ups while visiting any infected website that asks users to “Update your Windows”. As soon as user clicks on the update button/link it will redirect to a fake website with MicrosoftWindowsOperating System installer.

Unfortunately, if the user downloads the file, then the malicious svchost.exe payloads will be executed on your system. Soon after that, it starts encrypting data like documents, photos, videos, PDFs and so on with multi-layered cryptography and append “.facebook” file extension to them. Not only that, FBLocker ransomware also tampers other crucial windows system files like Windows Registries, other executable files, Windows boot processes, anti-virus programs and others.
FBLocker ransomware leaves a ransom note on the lock screen having a photo of Mark Zuckerberg. The note is originally written in Russian language and then translated to English using using Google Translator.

Removing FBLocker ransomware virus from the infected PC is a tricky process too, as it shuts down the installed anti-virus programs. So, you need to reboot your PC into “Safe Mode with Networking” and then download the anti-virus program provided below to detect and remove this threat.

immune_download_log

Continue reading

How To Uninstall DECRYPTORSOON301@AOL.COM (Complete Removal Solution)

DECRYPTORSOON301@AOL.COM is a newly detected threat in the family of ransomware that encrypts most of the files on the attacked PC. This harmful virus infiltrates through spam mail attachments, infected links and fake ads injected on malicious webpages. DECRYPTORSOON301@AOL.COM demands huge ransom of 3 BTC or roughly $3900 to be paid in form Bitcoins as the decryption fees. This ransomware is able to delete the shadow volume copies of the encrypted files and encrypts the files by appending DECRYPTORSOON301@AOL.COM extension. DECRYPTORSOON301@AOL.COM also leaves a ransom note that instruct the user on how the pay the ransom amount using the website through TOR network.

Cyber experts always recommend keeping a backup of all important files and never pay any ransom to such criminals as it is no any guarantee that they are going to give your files back. Instead go for powerful removal tool to remove DECRYPTORSOON301@AOL.COM ransomware from PC and try recovering files using data recovery tool.

List of file extension encrypted

→ .sql, .mp4, .7z, .rar, .m4a, .wma, .avi, .wmv, .csv, .d3dbsp, .zip, .sie, .sum, .ibank, .t13, .t12, .qdf, .gdb, .tax, .pkpass, .bc6, .bc7, .bkp, .qic, .bkf, .sidn, .sidd, .mddata, .itl, .itdb, .icxs, .hvpl, .hplg, .hkdb, .mdbackup, .syncdb, .gho, .cas, .svg, .map, .wmo, .itm, .sb, .fos, .mov, .vdf, .ztmp, .sis, .sid, .ncf, .menu, .layout, .dmp, .blob, .esm, .vcf, .vtf, .dazip, .fpk, .mlx, .kf, .iwd, .vpk, .tor, .psk, .rim, .w3x, .fsh, .ntl, .arch00, .lvl, .snx, .cfr, .ff, .vpp_pc, .lrf, .m2, .mcmeta, .vfs0, .mpqge, .kdb, .db0, .dba, .rofl, .hkx, .bar, .upk, .das, .iwi, .litemod, .asset, .forge, .ltx, .bsa, .apk, .re4, .sav, .lbf, .slm, .bik, .epk, .rgss3a, .pak, .big, wallet, .wotreplay, .xxx, .desc, .py, .m3u, .flv, .js, .css, .rb, .png, .jpeg, .txt, .p7c, .p7b, .p12, .pfx, .pem, .crt, .cer, .der, .x3f, .srw, .pef, .ptx, .r3d, .rw2, .rwl, .raw, .raf, .orf, .nrw, .mrwref, .mef, .erf, .kdc, .dcr, .cr2, .crw, .bay, .sr2, .srf, .arw, .3fr, .dng, .jpe, .jpg, .cdr, .indd, .ai, .eps, .pdf, .pdd, .psd, .dbf, .mdf, .wb2, .rtf, .wpd, .dxg, .xf, .dwg, .pst, .accdb, .mdb, .pptm, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx, .xls, .wps, .docm, .docx, .doc, .odb, .odc, .odm, .odp, .ods, .odt

If you are among the one being a victim of “DECRYPTORSOON301@AOL.COM”, then we would strongly suggest you not to pay any ransom to illegitimate persons behind it. Because even after paying they are not going to give your files back. So it is urged that you must opt for removal solutions for DECRYPTORSOON301@AOL.COM and try to recover files by automatic data recovery tool or any backup copy if you have.

immune_download_log

Continue reading

How To Uninstall WHITEROSE RANSOMWARE (Complete Removal Solution)

WHITEROSE RANSOMWARE is a newly detected threat in the family of ransomware that encrypts most of the files on the attacked PC. Security researchers had reported that the threat uses AES-256 and RSA-2048 encryption algorithm to encode files on the attacked PC and appends ‘.WHITEROSE’ extension to the encrypted files. It is analyzed that the WHITEROSE RANSOMWARE mostly targets English and Russian-speaking users. And is distributed through phishing email campaigns similar like Dream_dealer@aol.com Ransomware. Unfortunately, if the user downloads the infected mail attachment that is actually a macro-enabled document containing the payloads of the virus. Upon clicking, the document starts running the script and WHITEROSE RANSOMWARE gets installed on the attacked computer system.

After installed, it searches for the important documents, photos, video, audio, databases, PDFs and other local drives. The infection uses AES cipher to transcode the data that are locked by the filename and the‘.WHITEROSE’ suffix. For example, blackcat.jpg is renamed to blackcat.jpg.WHITEROSE. After the encryption process been done, then the Ransomware drops a file named as ‘README_FOR_DECRYPT_YOUR_FILES.txt’ on the desktop and the encryption locations.

The ‘README_FOR_DECRYPT_YOUR_FILES.txt’ file reads as:

‘All of your files have been Encrypted with military grade system and impossible to brute force, cracking, or reverse engineering it !
If you want all of your files back send me 0.03 BTC .
[+] Your Unique ID : [RANDOM CHARACTERS]
[+] Send BTC To This Address : 1WHITEROSEEPLr4ZRsoht8Wp6idBsT5TuBXtX
[+] Send BTC : 0.03 BTC
[+] Contact Email : WHITEROSEcQqL3Ruyi7V0RfZ@tutamail.com | WHITEROSE9hG1F7pbWqThUt9P8@mailfence.com
*) Don’t try change the ‘.WHITEROSE’ extensions , if you change it , your all files can be broken and can’t be restored forever .
*) If you’ve made a payment contact WHITEROSEcQqL3Ruyi7V0RfZ@tutamail.com | WHITEROSE9hG1F7pbWqThUt9P8@mailfence.com .
*) If you not made a payment all of your private files will be leaked on internet (private photos, documents, videos, and more) .
Question : How to buy Bitcoin ?
Answer : You can buy Bitcoin at this Website : bitcoin.com , coinbase.com , cex.io , paxful.com , coinmama.com , etc .
[+] Your IP : [YOUR REAL IP ADDRESS]
[+] Your ID : [RANDOM C

According to the ransom note, the authors demands 0.3 Bitcoin (1815 USD/1461 EUR) as ransom. WHITEROSE RANSOMWARE describes it as the ‘WHITEROSE Decryptor’ software which means after paying the amount amount the user will be provided with the decryption key to decode the locked files.

However, there is no any guarantee that they will decrypt all the files after receiving the payment. Thus, security researchers advise not to pay the ransom to the authors of WHITEROSE RANSOMWARE and quickly remove the threat from the PC. Also, you can try recovering your data from backups if any or take the help of data recovery software programs.

immune_download_log

Continue reading

How To Uninstall EUCODES17@GMAIL.COM (Easy Removal Steps)

What is ‘EUCODES17@GMAIL.COM’

EUCODES17@GMAIL.COM is detected as a ransomware virus by our security team. On being dropped this ransomware virus scan through the whole PC and such as JPG, PNG, AVI, MKV, MP3, GIF,XML DOCX, PDF and TXT using certain encryption mechanism in no time. And leave a ransom note which demands a fine of $300 in order to unlock your system within 48 hours. Moreover EUCODES17@GMAIL.COM delete your Shadow Volume Copies for which you may not able to recover your data. If you are a victim of “EUCODES17@GMAIL.COM”, then we would strongly suggest you not to pay any ransom to illegitimate persons behind it. Because even after paying they are not going to give your files back. Rather opt for EUCODES17@GMAIL.COM removal tool for effective solution.

immune_download_log

Continue reading