Infected with Amber Ransomware? Need to decrypt your files?

What is Amber Ransomware

This article will be devoted to the Amber boughs cryptovirus activity accounted for the beginning of February of this year. Like many analogs, this virus comes to your computer and encrypts user data of various formats, such as Office documents, archives, audio files, video, multimedia and more. After encrypting files, this changes their extension to .amber. Of course, these files become unusable for further use. The developers of this virus prudently create a special file and a note, which contains detailed information about encryption and methods of redemption.

Amber Ransomware

All your files have been encrypted!
All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail korvin0amber@cock.li
Write this ID in the title of your message *******
In case of no answer in 24 hours write us to theese e-mails:korvin0amber@cock.li
You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the decryption tool that will decrypt all your files.
Free decryption as guarantee
Before paying you can send us up to 1 file for free decryption. The total size of files must be less than 1Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)
How to obtain Bitcoins
The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click 'Buy bitcoins', and select the seller by payment method and price.
https://localbitcoins.com/buy_bitcoins
Also you can find other places to buy Bitcoins and beginners guide here:
hxxp://www.coindesk.com/information/how-can-i-buy-bitcoins/
Attention!
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

FILES ENCRYPTED.TXT is the short text file, that encourages users to contact the hackers with such message:

all your data has been locked us
You want to return?
write email korvin0amber@cock.li

The note contains ways to communicate with the attackers as well as the cost of the ransom. In practice, users can pay several hundred dollars at the back to encrypt their files. Of course, we do not recommend you to pay, because there are no guarantees in the final result. Best of all, read our recommendations to try to remove Amber and decrypt files yourself.

Update: Use following service to identify the version and type of ransomware you were attacked by: ID Ransomware. If you want to decrypt your files, please follow our instruction below or, if you have any difficulties, please contact us: submit@securitystronghold.com. We really can help to decrypt your files.

How Amber Ransomware infected your PC

Overwhelmingly, a cryptovirus and this kind comes to your computer as an attachment to a spam mailing list or as an update for a program that resides in your operating system. Of course, it is difficult for the user to detect the penetration of such viruses, so you need to buy advanced versions of antivirus software that can really prevent the penetration of these viruses and also remove what has already penetrated. Below you can read our recommendations to try to remove Amber and decrypt your files.

First of all, don’t panic. Follow these easy steps below.

1. Start your computer in Safe Mode with networking. To do that, restart your computer before your system starts hit F8 several times. This will Amber Ransomware system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the Amber Ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.

Recommended Solution:

SpyHunter 5 – fully removes all instances of Amber Ransomware – files, folders, registry keys.

 

Download SpyHunter

You may find more detailed information about antivirus products in our article – Top 5 Antivirus Software for Windows

Restore your files using shadow copies

data recovery pro gui

  1. Download and run Stellar Data Recovery.
  2. Select type of files you want to restore and click Next.
  3. Select the drive and folder where your files are located and date that you want to restore them from and press Scan.
  4. Once the scanning process is done, click Recover to restore your files.
Download Stellar Data Recovery

Step 2: Remove following files and folders of Amber Ransomware:

Related connections or other entries:

No information

Related files:

No information

How to decrypt files infected by Amber Ransomware?

You can try to use manual methods to restore and decrypt your files.

Decrypt files manually

Restore the system using System Restore

system restore

Although latest versions of Amber Ransomware remove system restore files, this method may help you partially restore your files. Give it a try and use standard System Restore to revive your data.

  1. Initiate the search for ‘system restore
  2. Click on the result
  3. Choose the date before the infection appearance
  4. Follow the on-screen instructions

Roll the files back to the previous version

Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged. This feature is available in Windows 7 and later versions.

windows previous versions

  1. Right-click the file and choose Properties
  2. Open the Previous Version tab
  3. Select the latest version and click Copy
  4. Click Restore

Written by Rami Douafi

Leave a Reply

Your email address will not be published. Required fields are marked *