Infected with Arena Ransomware? Need to decrypt your files?
What is Arena Ransomware
Arena Ransomware is successor of Dharma Ransomware from CrySis crypto-virus family.
Update: There is another version of Arena Ransomware, that uses similar pattern but is based on another algorithm and origins from CryptoMix family. There is certain difference between CrySis and CryptoMix vatiation, second one modifies filenames with hexadecimal sequence.
This malware uses asymmetric cryptography to encrypt users files, such as documents, photos, music, videos, games etc. This version appends .arena extension to affected files. After finishing encryption process various versions of Arena Ransomware can create different text or html files with instructions: FILES ENCRYPTED.txt, info.hta, Your personal data are encrypted!.txt, _HELP_INSTRUCTION.TXT. Ransomware can demand payment from 0.3 to 1 BitCoins (which is equivalent to $2000 – $6000) for decryption services, but usually malefactors don’t send any keys. Hackers use following e-mails for communication:
email@example.com, firstname.lastname@example.org, email@example.com, firstname.lastname@example.org, email@example.com, firstname.lastname@example.org, email@example.com
Currently, there are now 100% working decryptor for .arena files, but sometimes it is possible to remove this files using instructions and decryptors offered below. Encrypted files normally can be restored from online backups. To remove Arena Ransomware completely, and attempt to decrypt .arena files, please, use the guide below.
For servers owners: To recover SQL databases, .edb files, quickbooks from Arena Ransomware use SysTools Exchange Recovery, that can successfully restore encrypted data.
How Arena Ransomware infected your PC
Arena Ransomware usually infects your PC through infected email attachments (be careful, as cyber criminals usually mask their spam malicious emails with attachments into Ebay email or any other popular trusted website), fake software updaters and trojans – that’s why good anti-viruses is vitally important to avoid ransomware threat. You can also get this ransomware on file sharing networks, including torrent files. Ransom is asked to be paid in BitCoins, that also makes the task difficult for the police, as user in this network are often anonymous. Encryption starts in the background. Way to protect your computer from such threats is to use antiviruses with crypto-protection like HitmanPro.Alert with CryptoGuard.
First of all don’t panic. Follow these easy steps below.
1. Start your computer in Safe Mode with networking. To do that, restart your computer, before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the Arena Ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.
WiperSoft is a powerful removal tool. It can remove all instances of newest viruses, similar to Arena Ransomware – files, folders, registry keys.
*Trial version of WiperSoft provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Spyhunter.
Step 2: Remove following files and folders of Arena Ransomware:
Remove following registry entries:
Remove following files:
How to decrypt files infected by Arena Ransomware (.arena files)?
Use automated decryption tools
There is ransomware decryptor from Kaspersky that can decrypt .arena files. It is free and may help you restore .arena files encrypted by Arena Ransomware virus. Download it here:
You can also try to use manual methods to restore and decrypt .arena files.
Decrypt .arena files manually
Restore the system using System Restore
Although, latest versions of Arena Ransomware remove system restore files, this method may help you to partially restore your files. Give it a try and use standard System Restore to revive your data.
- Initiate the search for ‘system restore‘
- Click on the result
- Choose the date before the infection appearance
- Follow the on-screen instructions
Roll the files back to the previous version
Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged (in our case – Arena Ransomware by Arena Ransomware). This feature is available in Windows 7 and later versions.
- Right-click the file and choose Properties
- Open the Previous Version tab
- Select the latest version and click Copy
- Click Restore
Restore .arena files using shadow copies
- Download and run Data Recovery Pro.
- Select the drive and folder where your files are located and date that you want to restore them from and press Scan.
- Choose all files on folder you want to restore and select Restore.
- Choose export location and view restored files.
Protect your files from ransomware
Most modern software can protect your data from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach to protect your files from ransomware and lockers. One of the best is SOS Online Backup. The product will automatically find important files, then simply make a daily backup on the remote server. SOS runs quietly and automatically in the background and supports any size and any file type. All SOS apps (desktop AND mobile) encrypt files using UltraSafe 256-bit AES before transferring them to the cloud. You will not lose your important data. Download One Year Plan.
Information provided by: Alexey Abalmasov