1 of 2
Danger level 7
Type: Trojans
Common infection symptoms:
  • Slow Computer
  • System crashes
  • Connects to the internet without permission
  • Installs itself without permissions
  • Can't be uninstalled via Control Panel

Cockblocker Ransomware

Cockblocker Ransomware is a dangerous infection that – as our research reveals – might be still in the development stages. The sample of this malicious threat we have tested in our internal lab did not work the way it is supposed to; however, it is very possible that an upgraded version of this malware will be released soon, and this version will be much more dangerous. Needless to say, the purpose of this malware is to corrupt your personal files and to demand a ransom fee in return of a decryption key. At the moment, this ransomware is unable to encrypt files or demand for a ransom. Even the ransom note that this threat displays does not provide the victims with information that would allow them to pay the ransom. All in all, as you now know, everything could change, and this dangerous threat could soon start corrupting your files and introducing you to instructions on how to pay huge ransom fees. Hopefully, you have the chance to remove Cockblocker Ransomware from your operating system before it starts encrypting data.

According to our research, the malicious Cockblocker Ransomware can infect your operating system when you open a corrupted file. If this file is opened, the ransomware is executed, and all hell breaks loose. The infection can use the RSA encryption algorithm to encrypt all of your personal files. If your files are encrypted by this malware, you will find the “.hannah” extension attached to them. As mentioned already, the ransomware is currently unable to encrypt files because its Command & Control (C&C) server is down at the moment. Sure, it could be back up at any point. All in all, as long as the server is down, the malicious ransomware cannot do anything. If it is restored, first you will see a pop-up with the command prompt window alongside. After all, files are encrypted, Cockblocker Ransomware should also display a pop-up window called “RansomwareDisplay.” This window is meant to represent the ransom message, as well as the decryption key, and it should list the locations of all encrypted files. Speaking of the ransom note, it is very offensive as it uses derogatory names, and it is written in poor English. The good news is that you can remove this message by clicking the “X” button on the top-right corner.

As mentioned before, at this stage, Cockblocker Ransomware is unable to encrypt files or collect ransom fees because the user is not given any clues as to how to do that. There are no email addresses or other contact information, and no links routing to payment-related sites. Unfortunately, it is likely that with the next upgrade, the ransom note will contain more information, and you might be asked to pay a ransom fee. If that happens, you have to think carefully if you really want to follow the demands of cyber criminals. As you know, they are completely unpredictable, and it is difficult to say how they would act if you paid the ransom. Sure, you might be promised that your files would be decrypted soon after you made the payment; however, in reality, you could be duped. If that happened, you would lose your files and your money. Therefore, you have to think carefully if you should pay the ransom fee to have your files decrypted. We do not recommend that, and you should not even worry about it, in case, your personal files are backed up, and should be able to retrieve them after deleting Cockblocker Ransomware.

You have to be extremely cautious about your actions while Cockblocker Ransomware is active on your PC. We do not recommend browsing the web or using your computer in other ways. At the end of the day, a malicious infection is active on your operating system, and you have to be cautious. If you are going to take the risk of paying the ransom, we suggest that you look into legitimate file decryptors first. Also, you should check your backups first to see if maybe your files are backed up, and you can delete Cockblocker Ransomware from your operating system without further hesitation. In any case, even if you get your files decrypted, you have to erase the ransomware, and that might be more complicated than you think. In reality, all you have to do is delete the malicious launcher; however, if you do not know where to find it, you might be struggling. We recommend employing automated malware removal software to have the malicious infection deleted efficiently, reliably, and quickly.

Cockblocker Ransomware Removal

  1. Locate the malicious launcher file and right-click it.
  2. Select Delete to get rid of it.
  3. Install a trusted malware scanner.
  4. Perform a full system scan.
  5. Eliminate any remaining malicious threats.
Download Spyware Removal Tool to Remove* Cockblocker Ransomware
  • Quick & tested solution for Cockblocker Ransomware removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.