Infected with BlackPink Ransomware? Need to decrypt your files?

What is BlackPink Ransomware

This article is dedicated to a cryptovirus that has spread throughout the planet and causes a lot of trouble. What is most valuable for any user? of course the data! This is the aim of the developers of this virus. BlackPink encrypts user data using special algorithms, after which the files become unusable. Also, BlackPink changes the extension of these files to .BlackPink. After encryption, the cryptovirus creates a special text file how_to_recver_files.txt containing information about encryption and methods of ransom payment:

BlackPink Ransomware

Original:
------------------------------
BEGIN KOREAN
------------------------------
조언을 받으십시오 :
모든 파일, 사진 문서 및 데이터는 군용 등급 암호화 RSA AES-256으로 암호화되어 있습니다.
귀하의 정보는 손실되지 않습니다. 그러나 암호화.
파일을 복원하려면 Decrypter를 구입해야합니다.
이 단계에 따라 파일을 복원하십시오.
1 * Tor 브라우저를 다운로드하십시오. (구글에 "Tor 다운로드"만 입력하면됩니다.)
2 * URL 찾아보기 : http://www.google.com
3 * 파일을 복원하려면 Decryptor를 구입하십시오.
그것은 매우 간단합니다. 파일을 복원 할 수 있다고 생각지 않으면 이미지 형식의 파일 1 개를 무료로 복원 할 수 있습니다.
시간이 똑딱 거리고 있다는 것을 알아 두십시오. 가격은 96 시간마다 두 배가되므로 현명하게 사용하십시오.
고유 ID : injection
주의:
암호화 된 파일을 수정하거나 삭제하지 마십시오. 복원하기가 어려울 수 있습니다.
지원하다:
지원 센터에 문의하여 파일의 암호를 해독하는 데 도움을받을 수 있습니다.
------------------------------
END KOREAN
------------------------------

English:
------------------------------
BEGIN KOREAN
------------------------------
Get an advice:
All files, photographs, and data are encrypted with RSA AES-256 military grade encryption.
Your information is not lost. However, it is encrypted.
You must purchase Decrypter to recover your files.
Follow these steps to recover the files.
1 * Please download the Tor browser. (Just type "Tor Download" into google.)
2 * View URL: http://www.google.com
3 * To restore files, purchase Decryptor.
It is very simple. If you do not believe that you can recover your files, you can restore one file in image format for free.
Please note that time is ticking. Prices double every 96 hours, so use it wisely.
Unique identifier: injection
ATTENTION:
Do not modify or delete encrypted files. It will be difficult to recover.
Support:
You can contact the support center to decrypt the file.
------------------------------
END KOREAN
------------------------------

As it becomes clear from the note, fraudsters are aimed at users who speak Korean, but increasingly, users around the world complain about the presence of this threat. The main threat of frauds is the rise in price of ransom every 96 hours! Nobody wants to pay a few hundred dollars, is not it? However, do not pay, because it is a trap. There is no guarantee that fraudsters really decrypt your files. Use our recommendations to remove BlackPink and decrypt files.

Update: Use following service to identify the version and type of ransomware you were attacked by: ID Ransomware. If you want to decrypt your files, please follow our instruction below or, if you have any difficulties, please contact us: submit@securitystronghold.com. We really can help to decrypt your files.

How BlackPink Ransomware infected your PC

Like many other similar crypto viruses, BlackPink comes through vulnerabilities in the user network, due to the lack of adequate security. As a rule, a user simply needs to use suitable and current anti-virus software, which is really able to protect your PC and prevent the penetration of such threats and viruses. Below we have indicated ways to remove BlackPink and decrypt data.

First of all, don’t panic. Follow these easy steps below.

1. Start your computer in Safe Mode with networking. To do that, restart your computer before your system starts hit F8 several times. This will BlackPink Ransomware system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the BlackPink Ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.

Recommended Solution:

SpyHunter 5 – fully removes all instances of BlackPink Ransomware – files, folders, registry keys.

 

Download SpyHunter

You may find more detailed information about antivirus products in our article – Top 5 Antivirus Software for Windows

Restore your files using shadow copies

stellar-data-recovery

  1. Download and run Stellar Data Recovery.
  2. Select type of files you want to restore and click Next.
  3. Select the drive and folder where your files are located and date that you want to restore them from and press Scan.
  4. Once the scanning process is done, click Recover to restore your files.
Download Stellar Data Recovery

Step 2: Remove following files and folders of BlackPink Ransomware:

Related connections or other entries:

No information

Related files:

No information

How to decrypt files infected by BlackPink Ransomware?

You can try to use manual mBlackPinkods to restore and decrypt your files.

Decrypt files manually

Restore the system using System Restore

system restore

Although latest versions of BlackPink Ransomware remove system restore files, this mBlackPinkod may help you to partially restore your files. Give it a try and use standard System Restore to revive your data.

  1. Initiate the search for ‘system restore
  2. Click on the result
  3. Choose the date before the infection appearance
  4. Follow the on-screen instructions

Roll the files back to the previous version

Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged. This feature is available in Windows 7 and later versions.

windows previous versions

  1. Right-click the file and choose Properties
  2. Open the Previous Version tab
  3. Select the latest version and click Copy
  4. Click Restore

Written by Rami Douafi

Leave a Reply

Your email address will not be published. Required fields are marked *