Home Malware Programs Ransomware EvilLock Ransomware

EvilLock Ransomware

Posted: February 1, 2017

Threat Metric

Threat Level: 8/10
Infected PCs: 3
First Seen: February 1, 2017
Last Seen: March 12, 2020
OS(es) Affected: Windows

The number of crypto-threat infections being distributed in the wild is still rising gradually in the first months of 2017, and computer users must take the necessary security measures to prevent threats of this type from causing damage to their files. One of the new additions to the list of crypto-threats released in 2017 is the EvilLock Ransomware, a threat that appears to target mostly residents of the Czech Republic. However, this does not mean that users in other countries will not come across some of the corrupted e-mail messages used to spread the EvilLock Ransomware's payload, and it is very likely that users all across America or Europe may end up having their computers locked by the EvilLock Ransomware if they don't have the necessary measures to prevent this.

Naturally, the best protection against the EvilLock Ransomware and threats similar to it is to use a reputable anti-malware software suite that will scan all incoming files for corrupted indicators. In addition to this, credible anti-virus products also can warn you if you are about to browse unsafe Web pages or other suspicious content. Taking the necessary security measures is important because an infection with the EvilLock Ransomware can cost you dearly. This ransomware features a working encryption routine, which targets some of the most popular file extensions used by documents, media files, backups and archived files. Whenever the EvilLock Ransomware successfully encrypts a file's contents, it also will modify the name of the original file by adding '.the EvilLock' as an additional extension (e.g. 'spreadsheet.xlsx' will be renamed to 'spreadsheet.xlsx.the EvilLock').

'As you can see some of your files have been encrypted!
Encryption was made using a unique strongest AES key. If you want to restore your files you need to BUY the key, it costs 0.3 BTC. Send me your ID gena1983@mbx.kz.'

The exact number of file types that the EvilLock Ransomware targets is yet unknown, but we assure you that the ransomware's authors have taken the necessary measures to ensure that their product will inflict as much damage as possible to infected computers. When the encryption routine of the EvilLock Ransomware finishes, the threat proceeds with the next stage of the attack – announcing its demands. To do this, the EvilLock Ransomware creates two ransom notes that victims can find in the files named 'HOW_TO_DECRYPT_YOUR_FILES.HTML' and 'HOW_TO_DECRYPT_YOUR_FILES.TXT'. They contain the exact same information and urge users to contact gena1983@mbx.kz to learn how they can transfer the ransom fee of 0.3 Bitcoins (approximately $300) to the attacker's Bitcoin wallet. However, the ransom message does not mention anything about free decryption as proof that this is possible, nor does it provide victims with any reassurance that they'll get their files back if they fulfill the attacker's demands. These are all red flags that are enough to remind you that paying money to anonymous cyber-crooks is never a good idea! Instead of risking your hard-earned money, we advise you to look for an alternative way out of this unfortunate situation. Regardless of the file recovery method you choose, you must not forget to start by removing the EvilLock Ransomware's components with the help of a trustworthy anti-virus product.

Loading...