How to remove Alma Locker ransomware virus

Computers & TechnologySite Security

  • Author John Stephens
  • Published August 31, 2016
  • Word count 493

Today we will talk about the latest ransomware virus, called Alma Locker. This virus was discovered a few days ago, and now we can say that it is one of the most dangerous in recent months. Most ransomware, created in recent months have been pretty poor quality, and breaking most of them took no more than a week. In contrast, Alma Locker has no serious errors in its structure, and its encryption is secure.

Alma Locker was discovered by a researcher from Proofpoint, Darien Huss. Proofpoint said that so far there is no free no way to decrypt the encrypted files, but work is being done on it. Currently, the only safe way to restore files is the load of backups. If you have not made a backup - your files are likely to be lost.

How Alma Locker penetrates the system and encrypts the files

Alma Locker, like other similar viruses is being distributed via e-mail. After infection, the virus generates a random extension that will be added to the file names, and computer ID, based on the serial number of the drive C and MAC address of the first network interface. The virus can encrypt almost all the most popular data extensions, this applies to audio and video files, text documents and images. The program files remain safe. Alma Locker uses AES-128 encryption algorithm, so if you are going to try to decrypt the files yourself - you will fail.

When the encryption process is finished, the virus displays a message to the user with the requirements of redemption, referring to the payment to the TOR network sites, and links to download the decryption software, after the payment of ransom. Redemption amount is 1 Bitcoin, but fraudsters have established payment term of 5 days. While it is not known what will happen at the end of this period. It is likely that the amount of foreclosures will increase, or files will be deleted (partially or completely).

One of the links in the message leads to the requirements of TOR on the site where your ID is displayed, and the name of the extension that your files received. Also, we'll see how many hours left before the completion of 5-day count. In the design of the website the pirate flag "Jolly Roger" is used. Rather, it is an allusion to the fact that, if user won’t pay the ransom, hackers will make him to walk the plank, or he will be keelhauled and sent to feed the fish. We hope that this is only a joke, and hackers won’t do such terrible things to regular users.

Despite the fact that Alma Locker is not an extraordinary virus, it is created with high quality and, most likely, its hacking will take at least a few weeks. If you are not going to pay hackers for data recovery, and want to protect other files from encryption, you should remove the virus from your computer.

Hello, dear Reader, my name is John and I'm proud to share my new article with you. if you have some questions about the removal process - the step-by-step instructions to remove the virus, as well as options for file recovery can be found in the extended article about how to remove Alma Locker ransomware and restore the encrypted files.

Article source: http://articlebiz.com
This article has been viewed 1,844 times.

Rate article

Article comments

There are no posted comments.

Related articles