How to remove Jigsaw ransomware and decrypt .FUN, .KKK, .GWS, .BTC files

Jigsaw ransomware is an encryption virus that on the whole resembles such infections as TeslaCrypt, Locky or Cerber ransomware. Alike these notorious viruses, Jigsaw infiltrates systems covertly and finds the files of certain extensions to encrypt them with an ARS code, and in the end it sets a message to inform a victim about payment terms. The threat demands $150 USD which should be transferred in BitCoins.

Learn More

How to remove Cerber Ransomware and decrypt .cerber files

Cerber ransomware virus was introduced not so long ago, but it already managed to create a lot of trouble to its victims. What is remarkable, the ransomware disregards the systems located in one of the following countries: Azerbaijan, Armenia, Georgia, Belarus, Kyrgyzstan, Kazakhstan, Moldova, Turkmenistan, Tajikistan, Russia, Uzbekistan, Ukraine. If the ransomware ends on a computer with one of these locations, it eliminates itself, otherwise Cerber adds its process on the startup list, so it would remind a user of the threat presence with every reboot.

Learn More

How to remove CTB-Locker and decrypt .CTBL files

CBT Locker (or Curve-Tor-BitCoin Locker, or Critroni) is a ransomware that was released in June 2014 and has been operating till present. The ransomware targets Windows systems and is able to infect all versions of the OS released up to now. What marks CBT-Locker out from other ransomware viruses is the encryption algorithm, which is ECC (Elliptic Curve Cryptography) instead of common RSA or AES codes. This encryption methods is more complicated and thus makes decryption next to impossible.

Learn More

How to remove TeslaCrypt ransomware

Teslacrypt is a ransomware application that was released in February 2015. The ransomware is designed to infect all versions of Windows existing at the moment. Settled on a victim’s system TeslaCrypt makes changes on a system level, which start with disabling of Windows Task Manager, Regedit and Command Prompt tools. Blocking of these utilities is aimed to complicate the removal process and to tighten the pressure showing the user that the computer is totally under the control of the ransomware.

Learn More

How to remove Locky Ransomware and decrypt .locky, .zepto, or .odin files

Locky Ransomware is a recently appeared example of ransomware. The malware cyphers the files with AES encryption code and later on demands ransom in the sum of 0.5 BitCoins in the exchange for the decryption key. In a while, it operates in a way other ransomware threats do – it appears on a systems and looks for files of certain extensions. As some other ransomware viruses, Locky changes names of encrypted files for making the process of retrieving the data more difficult.

Learn More

How to remove Cryptolocker ransomware and decrypt .encrypted files

CryptoLocker is the name of a ransomware posing a great menace to computers as it compels users to pay money for retrieving the encrypted files. Just after the decryption CryptoLocker finishes the ciphering it displays a note saying that your data will remain unavailable until you purchase a key. However it does not warrant decryption, the cybercriminals may intentionally send you a wrong code. This will reduce the time left and inflict more panic, and for the second key cyber criminals will demand more money.

Learn More

How to remove CryptoWall Ransomware and decrypt files

CryptoWall is the name of a malicious program that is designed to encrypt victim’s files, so that its developers could demand ransom for their retrieval. The ransomware aims for the most popular file types and is able to infiltrate any version of Windows, whether it is Windows XP, Windows Vista, Windows 7, Windows 8, or Windows 10. The detected files will be encrypted with the RSA ciphering, making these files inaccessible. With the encryption of the last file CryptoWall displays a window with the note that suggests the ransom details.

Learn More