New version of GANDCRAB has been released
GANDCRAB V5.0 is an improved variant of notorious GandCrab 3 data-kidnapping virus. Although it’s a new virus, the main purpose has remained the same – data encryption as a means of extortion. The amount or ransom is established individually for all victims and depend on the type of activity (home PC, small organizations, large organizations). By the way, if you have been attacked by GANDCRAB V5.0 Ransomware, there is no need to contact them and especially to make any concessions. Remember, you are up against fraudsters who don’t care about your files and whose the main purpose is to make a profit. Hence, there is a high risk of being left without decryptor and money. Instead, you may try using this guide to remove GANDCRAB V5.0 Ransomware and decrypt files without spending any money.
This ransomware mostly penetrates the system via fraudulent emails containing malicious attachments. When the user launches attached file, the virus starts infecting victim’s data using complicated encryption algorithms. The encrypted files are appended with the random 5 character extension. For example, mydoc.doc file might be changed to mydoc.doc.lntps.
Once all the data is enciphered, ransomware sets new desktop wallpaper:
and then drops ransom note [extension]-DECRYPT.html in each folder with the affected files. In our case, the file is called LNTPS-DECRYPT.html:
The user may find here the demands of criminals to decrypt encrypted files:
–= GANDCRAB V5.0 =—
All your files, documents, photos, databases and other important files are encrypted and have the extension: .LNTPS
The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files.
The server with your key is in a closed network TOR. You can get there by the following ways:>
Download Tor browser – hxxps://www.torproject.org/
Install Tor browser
Open Tor Browser
Open link in TOR browser: hxxp://gandcrabmfe6mnef.onion/113737081e857d00
Follow the instructions on this page
On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free.
IN ORDER TO PREVENT DATA DAMAGE:
* DO NOT MODIFY ENCRYPTED FILES
* DO NOT CHANGE DATA BELOW
The cybercriminals want the victim to follow hxxp://gandcrabmfe6mnef.onion/113737081e857d00 link via TOR browser (to preserve their anonymity). By clicking on this link, we will see the ransom amount and instructions on how to transfer them money:
Although GANDCRAB V5.0 is a really dangerous virus, you still have a good chance to get your files back. Before deciphering, you should first stay focused on removing GANDCRAB V5.0 Ransomware to avoid re-infection. Once GANDCRAB V5.0 Ransomware is removed, you can proceed with decryption. Both automatic and manual solution is presented here that we hope will help you remove GANDCRAB V5.0 Ransomware and recover your files.
How to remove GANDCRAB V5.0 ransomware?
To make sure that the ransomware won’t reappear, you need to delete GANDCRAB V5.0 ransomware completely. For this, you need to remove the files and registry entries of the ransomware. We should warn you that performing some of the steps may require above-average skills, so if you don’t feel experienced enough, you may apply to the automatic removal tool.
Performing an antimalware scan with Norton would automatically search out and delete all elements related to GANDCRAB V5.0 ransomware. It is not only the easiest way to eliminate GANDCRAB V5.0 ransomware but also the safest and the most assuring one.
How to decrypt files
Restore files with Stellar Data Recovery
Stellar Data Recovery is an essential tool in the fight against ransomware-type viruses that can recover encrypted files.
- Download Stellar Data Recovery and launch it
- Select the drive you want to recover and click START SCAN
- After scanning is finished, you are presented with a list of recoverable files found.
- Select the required files and click the Recover
Decrypt files through our decryption service
You may try using our own service for decrypting files compromised by ransomware-type viruses. The analysis of data takes 3-5 days, after which, we will let you know whether it’s decryptable or not. Note: the service is paid, payment is charged only for decryption, the analysis is free. In order to use our service, you should fill out the form listed below.
Also, please add a log file, created on your PC:
- Click “Start” and type: “cmd.exe” in the search box
- Right-click “cmd.exe” and select “Run as administrator“
- In command line, type or copy/paste following: dir C:\ /a/s > “%userprofile%\dirc.log”
- Find and attach the created “%userprofile%\dirc.log” file to the web form
Please attach encrypted text files according to the following conditions:
- number of files should not exceed 4;
- file size is not more than 8 megabytes;
- files must be from different folders;
- files must be unique.
Restore the system
- Initiate the search for system restore
- Click on the result
- Choose the date before the infection appearance
- Follow the on-screen instructions
Roll the files back to the previous version
- Right-click the file and choose Properties
- Open the Previous Version tab
- Select the latest version and click Copy
- Click Restore
If the above-mentioned methods didn’t help in eliminating the threat, then it’s better to rely on an automatic way of deleting GANDCRAB V5.0 Ransomware.
How to prevent ransomware infection
To prevent infection with ransomware-type viruses, you should have proper antimalware software. This method is convenient because it allows you to detect a virus before it penetrates, and therefore to avoid infection and the loss of all your data. It is capable of protecting not only home computers but also server systems in large organizations. Download antimalware program to secure your system and privacy.