Shrug ransomware: Unlock your computer without ransom

Shrug: A new form of ransomware is being distributed with drive-by attacks, but the malware contains bugs in its coding. Below we will see how you can recover your locked ones free.

Shrug ransomware first appeared on July 6 and is embedded in fake software and game applications. Those who download such an application also acquire the malicious file that locks their files.
The ransom note reads:

I know what you're thinking, What happened? The answer is very simple Before I tell you, promise you won't go crazy.. Ok o ς σου είναι θύμα μιας επίθεσης Ransomware” αναφέρει το μήνυμα και στο τέλος ζητάει 50 δολάρια στο για την αποκρυπτογράφηση των αρχείων.

Like other ransomware, the note also has instructions on how to do it and Bitcoin transfer, as well as a threat that all files will be completely destroyed in three days if the ransom is not paid. Encrypted files are locked with a .SHRUG extension.

Shrug uses a random set of keys for each user, but its researchers security company LMNTRIX, found that the creators of the ransomware left the keys they needed to unlock the files in a folder, allowing their victims to retrieve their files without paying the ransom. Keys found embedded in the registry, encrypted.

To decipher your infected files from the Shrug ransomware, you will need to restart the infected machine to end the process that uses the ransomware to lock the mouse and the keyboard.

After that, you will need to open File Explorer to go to the installation path of Shrug ransomware:

C: \ Users \ USERNAME \ AppData \ Local \ Temp \ shrug.exe

Delete the file shrug.exe file by pressing Shift and Delete together.

Then open the RUN application by typing "RUN" in the Windows search. Then type "Regedit" to open the registry.

Follow the route:

HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run

Find the key labeled "Shrug", and delete it. Then clean the recycle bin, and restart your machine and the ransomware will disappear.

Shrug indicates that it is possible to build ransomware from criminals who do not have the necessary skills to do it effectively.

The low value of the ransom may also suggest that the attackers were not so sure about their product, which may still be under development.

Malware reminds us once again that we need to download software only from trusted sources.

___________________ The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).