Infected with File Spider Ransomware? Need to decrypt your files?
What is File Spider Ransomware
File Spider Ransomware is crypto-virus, that uses the AES-128 and RSA-2048 encryption algorithm to encrypt user files. After this, ransomware appends .spider extension to affected files and creates HOW TO DECRYPT FILES.url, that opens the browser window with the ransom-demanding message. Virus demands ransom .00726 BitCoins (~130$). Here are the contents of this window:
YOUR PC HAS BEEN INFECTED WITH FILE SPIDER VIRUS
As you may have already noticed, all your important files are encrypted and you no longer have access to them. A unique key has been generated specifically for this PC and two very strong encryption algorithm was applied in that process. Original content of your files are wiped and overwritten with encrypted data so it cannot be recovered using any conventional data recovery tool.
The good news is that there is still a chance to recover your files, you just need to have the right key.
To obtain the key, visit our website from the menu above. You have to be fast, after 96 hours the key will be blocked and all your files will remain permanently encrypted since no one will be able to recover them without the key!
Remember, do not try anything stupid, the program has several security measures to delete all your files and cause the damage to your PC.
To avoid any misunderstanding, please read Help section.
File Spider Ransomware targets most important user data. These are MS Office documents, OpenOffice, PDF, text files, databases, photos, music, videos, image files, archives, web page files and other web files, educational, application and specialized files, and other files. Currently, files infected or encoded by this threat are non-decryptable, but there are certain methods to restore .spider files manually. Follow instructions below to remove File Spider Ransomware completely from Windows 10, 8, 7 and decrypt your files.
How File Spider Ransomware infected your PC
At this moment, we know that several e-mails are used to distribute doc files with malicious macros MEDIS_PHARMA_DOO_17443.doc and BAYER_CROPSCIENCE_OFFICE_BEOGRAD_93876.doc. E-mails are distributed in Serbia and other countries of Eastern Europe. Macros runs file powershell.exe, that copies and starts enc.exe file in %APPDATA%\Spider\ folder. This file start encryption process and after finishing starts dec.exe file, that provides functionality to pay the ransom. You can also get this ransomware on file-sharing networks, including torrent files. Ransom is asked to be paid in BitCoins, that also makes the task difficult for the police, as the user in this network is often anonymous. Encryption starts in the background. Way to protect your computer from such threats is to use antiviruses with crypto-protection like HitmanPro.Alert with CryptoGuard.
First of all, don’t panic. Follow these easy steps below.
1. Start your computer in Safe Mode with networking. To do that, restart your computer before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the File Spider Ransomware virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.
Norton is a powerful removal tool. It can remove all instances of newest viruses, similar to File Spider Ransomware – files, folders, registry keys.
*Trial version of Norton provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Norton.
Step 2: Remove following files and folders of File Spider Ransomware:
Remove following registry entries:
Remove following files and folders:
%UserProfile%\Desktop\HOW TO DECRYPT FILES.url
How to decrypt files infected by File Spider Ransomware (.spider files)?
Use automated decryption tools
There is ransomware decryptor from Kaspersky that can decrypt .spider files. It is free and may help you restore .spider files encrypted by File Spider Ransomware virus. Download it here:
You can also try to use manual methods to restore and decrypt .spider files.
Decrypt .spider files manually
Restore the system using System Restore
Although, latest versions of File Spider Ransomware remove system restore files, this method may help you to partially restore your files. Give it a try and use standard System Restore to revive your data.
- Initiate the search for ‘system restore‘
- Click on the result
- Choose the date before the infection appearance
- Follow the on-screen instructions
Roll the files back to the previous version
Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged (in our case – File Spider Ransomware by File Spider Ransomware). This feature is available in Windows 7 and later versions.
- Right-click the file and choose Properties
- Open the Previous Version tab
- Select the latest version and click Copy
- Click Restore
Restore .spider files using shadow copies
- Download and run Shadow Explorer.
- Select the drive and folder where your files are located and date that you want to restore them from.
- Right-click on folder you want to restore and select Export.
- Once the scanning process is done, click Recover to restore your files.
Protect your computer from ransomware
Most modern antiviruses can protect your PC from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach t protect from ransomware and lockers. One of the best is HitmanPro.Alert with CryptoGuard. You may already know HitmanPro as famous cloud-based anti-malware scanner. Check out ultimate active protection software from SurfRight.
Information provided by: Alexey Abalmasov