1 of 2
Danger level 6
Type: Trojans
Common infection symptoms:
  • Slow Computer
  • Normal system programs crash immediatelly
  • Connects to the internet without permission
  • Installs itself without permissions
  • Can't be uninstalled via Control Panel

Alexbanan@tuta.io Ransomware

Alexbanan@tuta.io Ransomware is one of the many ransomware infections that intend to reap financial profit by extorting ransom payments from innocent users. If you were infected with this program, you can scroll down to the bottom of this description for the manual removal instructions. Although manual removal is not complicated, it would still be a good idea to invest in a licensed antispyware tool that would scan your PC for other potential threats. Also, if you encounter something unfamiliar, do not hesitate to address a professional. Professional help could be especially valuable when it comes to file recovery.

From what we know, Alexbanan@tuta.io Ransomware is just another version of the Paradise Ransomware infection. It is very likely that this program is a direct clone of the previously released application. Therefore, if there is a public decryption tool available for Paradise Ransomware, it is possible that it might work on Alexbanan@tuta.io Ransomware, too. However, you might want to check that in advance.

So how is Alexbanan@tuta.io Ransomware different from Paradise Ransomware? According to our researchers, the only important part that seems to have been changed is the email address used and the extension added to the encrypted files. When ransomware programs encrypt target files, they usually add an extension to the filename. This extension tends to have something in common with the name of the infection. Also, the extension makes it easy to discern affected files. Although it shouldn’t be too hard in the first place: When the ransomware encrypts files, their icons change too because the system is no longer able to read them.

Either way, when you are infected with Alexbanan@tuta.io Ransomware, and this program encrypts your files, the filenames change accordingly:

Before: Crysanthemum.jpg
After: Chrysanthemum.jpg_o0QG3Tg3OO2gwQ52_{alexbanan@tuta.io}.CORP

Needless to say, it is really easy to notice that something is wrong when files have such long extensions. However, extensions are not the only thing that you will see when this program slithers into your system. Alexbanan@tuta.io Ransomware will also display the following ransom note:

Your files are encrypted!
Paradise Ransomware Team!


  • Your important files produced on this computer have been encrypted due a security problem.

  • If you want to restore them, write to us by email.

  • You have to pay for decryption in Bitcoins. The price depends on how fast you write to us.

  • After payment we will send you the decryption tool that will decrypt all your files.

This is the general ransom note that you can expect from most of the ransomware applications. As you can clearly see, it tries to push users into contacting the main command and control center. However, this program is so old, that it is very likely that it is impossible to contact the criminals behind it. What’s more, even if you were to transfer the ransom payment, it probably wouldn’t issue the decryption key.

So, what do we do about it? Of course, you can always remove Alexbanan@tuta.io Ransomware from your system. However, aside from removing ransomware, you should do yourself a favor and learn more about ransomware distribution patterns. If you can recognize ransomware installers, you might save yourself the trouble of dealing with such infections later on.

As far as we know, the most common ransomware distribution method is spam email, which means that you encounter ransomware installers first hand. You must have downloaded and launched the ransomware installer yourself because the file looked like something legitimate. However, we before you open files from unfamiliar senders, you should scan them with a security tool. This way, at least, you would minimize the potential threat of a ransomware infection.

Also, it is not hard to remove Alexbanan@tuta.io Ransomware. You just need to delete the most recently downloaded files that could have launched the infection. It is a lot hard to recover your files, but it shouldn’t be too challenging if you have been backing up your data on a cloud drive or an external hard drive. If that is the case, simply delete the encrypted files and copy the backup back into your computer. If you do not have a backup drive, you will have to explore other file recovery options. Do not feel discouraged because there is often a way to restore at least part of your files.

How to Delete Alexbanan@tuta.io Ransomware

  1. Remove unfamiliar files from Desktop.
  2. Open the Downloads folder.
  3. Delete the most recently downloaded files.
  4. Run a full system scan with SpyHunter.
Download Spyware Removal Tool to Remove* Alexbanan@tuta.io Ransomware
  • Quick & tested solution for Alexbanan@tuta.io Ransomware removal.
  • 100% Free Scan for Windows

Post comment — WE NEED YOUR OPINION!

Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.