Infected with PGPSnippet Ransomware? Need to decrypt your files?
What is PGPSnippet Ransomware
PGPSnippet Ransomware is another encryption virus, which brings a lot of troubles. It encrypts files that are usually the most relevant to the user, for example, text documents, images and photos, PDP files, and much more. It uses special sophisticated algorithms, because of what the user cannot open the encrypted files or restore it. Plus, it replaces file extensions by adding .decodeme666@tutanota_com, for example, if you have a Photo.png file, then its name becomes Photo.png.decodeme666@tutanota_com. Recently, developers added 2 more options for changing file extensions, namely .good and .firstname.lastname@example.org. Also, PGPSnippet Ransomware creates a note with information about encryption and here’s how it looks:
here is the note content:
All your documents and other files ENCRYPTED !!!
TO RESTORE YOUR FILES YOU MUST TO PAY: 500$ by Bitcoin to this address: 1Nvhebx6EHmFmXokSbXMxbCNGN2fwtgq8W
You can open a wallet here: hxxps://electrum.org/#download hxxps://blockchain.info hxxps://localbitcoins.com/ hxxps://paxful.com/en hxxps://www.bestchange.com/
Send the file on the way WIN + R >> %APPDATA% file name hosts.txt to our e-mail after payment at this email address: email@example.com
We will confirm payment and send to you decrypt key + instruction
Remember: you have a 72 hours and if you not paid, that price will up
ATTENTION : all your attempts to decrypt your PC without our software and key can lead to irreversible destruction of your files !
Scammers promise to decrypt your files if you pay them $ 500 by bitcoins. Cryptocurrency is chosen deliberately because this is one of the developers’ tricks to avoid punishment. In no case do not believe the scammers! Their only goal is to get money, the attackers do not care about your data, so do not expect that they will really help you. The only right decision – to use special programs that can help you restore your files to their original state.
How PGPSnippet Ransomware infected your PC
PGPSnippet virus-extortioner comes to the computer without the user’s consent as an email attachment or when spam mailing. Also, it can come bundled with other malicious software through unprotected network settings. You need to use special utilities and programs that can help to protect your PC. If PGPSnippet has already come to your PC, then you can use our detailed recommendations to remove it right now and decrypt your files. HitmanPro.Alert with CryptoGuard.
First of all, don’t panic. Follow these easy steps below.
1. Start your computer in Safe Mode with networking. To do that, restart your computer before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the PGPSnippet Ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.
WiperSoft is a powerful removal tool. It can remove all instances of newest viruses, similar to PGPSnippet Ransomware – files, folders, registry keys.
*Trial version of WiperSoft provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Spyhunter.
Step 2: Remove following files and folders of PGPSnippet Ransomware:
Remove following registry entries:
Remove following files:
How to decrypt files infected by PGPSnippet Ransomware?
Use automated decryption tools
There is ransomware decryptor from Kaspersky that can decrypt Spora files. It is free and may help you restore files encrypted by PGPSnippet Ransomware virus. Download it here:
You can also try to use manual methods to restore and decrypt your files.
Decrypt files manually
Restore the system using System Restore
Although, latest versions of PGPSnippet Ransomware remove system restore files, this method may help you to partially restore your files. Give it a try and use standard System Restore to revive your data.
- Initiate the search for ‘system restore‘
- Click on the result
- Choose the date before the infection appearance
- Follow the on-screen instructions
Roll the files back to the previous version
Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged (in our case – PGPSnippet Ransomware by PGPSnippet Ransomware). This feature is available in Windows 7 and later versions.
- Right-click the file and choose Properties
- Open the Previous Version tab
- Select the latest version and click Copy
- Click Restore
Restore .lock, .1btc or .mich files using shadow copies
- Download and run Data Recovery Pro.
- Select the drive and folder where your files are located and date that you want to restore them from and press Scan.
- Choose all files on folder you want to restore and select Restore.
- Choose export location and view restored files.
Protect your computer from ransomware
Most modern antiviruses can protect your PC from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach t protect from ransomware and lockers. One of the best is HitmanPro.Alert with CryptoGuard. You may already know HitmanPro as famous cloud-based anti-malware scanner. Check out ultimate active protection software from SurfRight.
Written by Rami Douafi