Click on screenshot to zoom
Danger level 7
Type: Trojans
Common infection symptoms:
  • Slow Computer
  • System crashes
  • Normal system programs crash immediatelly
  • Connects to the internet without permission
  • Installs itself without permissions
  • Can't be uninstalled via Control Panel

MedusaLocker Ransomware

MedusaLocker Ransomware does not need your permission to attack your Windows operating system, but it is likely that it needs some of your input anyway. Malware like this file encryptor usually spread via spam emails and bundled downloaders, and you either need to open a misleading email and click the attached file, or you need to execute the installer. Unfortunately, cybercriminals can set up malware launchers to look quite inconspicuous, and so you might end up executing malware without even knowing it. That is why Odveta Ransomware, DeathRansom Ransomware, Zobm Ransomware, Start Ransomware, and hundreds of other file-encrypting threats are so prevalent and so successful. The biggest issue with this kind of malware is that victims are not always able to delete it without facing lasting consequences. Even if you remove MedusaLocker Ransomware, there is a good chance that you will not be able to forget this threat. If you are curious to learn more, continue reading.

If cybercriminals manage to execute MedusaLocker Ransomware successfully, and if security software is not there to catch and delete this threat, bad things start happening immediately. The infection can kill processes, create Windows tasks, drop files, and even delete volume shadow copies. What does that mean? That means that files cannot be recovered using a system restore point. That is why it is crucial to use external/online backups to save copies of your personal files. We hope you have such copies because that means that you only need to worry about the removal of the threat. Of course, before you even think about deleting MedusaLocker Ransomware, you might have to go through a couple of steps. First of all, you need to understand what has happened, and that is why the infection creates a file named “HOW_TO_RECOVER_DATA.html.” It is possible that you will find copies of this file next to all of the encrypted files. According to our experts, the threat encrypts everything except for files with .dll, .exe, .ini, .lnk, .rdp, and .sys extensions in %USERPROFILE% and %HOMEDRIVE% directories. Also, the encrypted files might have .encrypted, .bomber, .boroff, .breakingbad, .locker16, .newlock, .nlocker, or .skynet appended as additional extensions.

The .HTML file that MedusaLocker Ransomware drops is meant to convince the victims of this malware that they need to contact the attackers. There aren’t many conditions for that, and all one has to do is send one encrypted file to rdp_unlock@outlook.com or rdpunlock@cock.li. Easy enough, right? Well, if you do that, you will be asked to pay a ransom. That is something you can understand by reading the message represented via the .HTML file. What you might not realize is that if you use your actual email account to communicate with cybercriminals, you might end up being flooded with spam emails right away and later on in the future. On top of that, do you really believe that you can have a deal with cybercriminals? So what if they promise to provide you with a “unique decryptor” once you pay the ransom? No one can know how cybercriminals will act in reality. We would bet on them breaking their promise because, at the end of the day, they built MedusaLocker Ransomware to make money, and they are unlikely to care about anything else beyond that. Your files are collateral damage to them, and they are not affected by it.

If copies of personal files exist – preferably online or on external drives – once you delete MedusaLocker Ransomware from your operating system, you will be able to replace the corrupted files. If you do not have backups or copies, you might be thinking about taking a risk and following the demands of cyber attackers. We do not recommend it, but you are free to do what you like. In any case, you must remove MedusaLocker Ransomware, and there are several options to choose from. You can try removing the infection manually, but that is not an easy task because we do not know how the infection got in, and so we can only guess where the launcher could be. Another option – and this one is more secure – is to install a legitimate anti-malware program. It will automatically scan your system and delete the threats that exist. Further on, it will also ensure full-time protection so that new threats could not attack again.

MedusaLocker Ransomware Removal

  1. Delete recently downloaded files (check the Desktop, the Downloads folder, and other locations).
  2. Tap Win+E keys on the keyboard at the same time to launch Windows Explorer.
  3. Enter %APPDATA% into the field at the top to access the directory.
  4. Right-click a malicious file named svchostt.exe (could be named differently) and choose Delete.
  5. Enter %WINDIR%\System32\Tasks\ into the field at the top to access the directory.
  6. Right-click a task named svchostt (could be named differently) and choose Delete.
  7. Tap Win+R keys on the keyboard at the same time to launch Run.
  8. Enter regedit into the box and click OK to access the Registry Editor.
  9. In the panel on the left, navigate to HKEY_CURRENT_USER\Software\.
  10. Right-click the key named Medusa and choose Delete.
  11. Exit Registry Editor and Explorer and then Delete all copies of the HOW_TO_RECOVER_DATA.html file.
  12. Empty Recycle Bin and then immediately perform a full system scan using a trusted malware scanner.
Download Spyware Removal Tool to Remove* MedusaLocker Ransomware
  • Quick & tested solution for MedusaLocker Ransomware removal.
  • 100% Free Scan for Windows
disclaimer
Disclaimer

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.