What does .[firstname.lastname@example.org].NEWS mean?
Recently internet users have faced the newest threat, called NEWS ransomware. This virus belongs to the Dharma file encryption ransomware family, which tends to spread very fast. The clearest sign of the NEWS ransomware encryption is the .*id*.[email@example.com].NEWS extension, which is added to the end of the encrypted files names. In the most cases, this virus spreads by the means of various executable files and installators. However, hackers can also easily inject the code of the virus into a regular harmless file and send it by email. Once such an attachment is opened, the virus immediately sneaks into the operating system. When it’s in, ROGER makes some changes in the registry in order to hide its processes and get an access to various functions. Then the virus begins the scanning of the hard drive with the aim to find files, suitable for encryption. When the files are found, the virus modifies their structures and makes them unreadable. As the result the files get the new, already mentioned, extension – .*id*.[firstname.lastname@example.org].NEWS. As the rule, hackers try to force their victims into purchasing the decryptor from them and it’s the main purpose of such attacks. We strongly recommend you to avoid any contact with the criminals! Commonly, hackers ignore their victims, once they’ve been paid. However, the surest way to decrypt your data is to get the decryptor, still there is a hope. We’ve prepared the detailed guide on how to remove NEWS ransomware and decrypt .*id*.[email@example.com].NEWS files safely.
- How to remove NEWS Ransomware from your computer
- How to decrypt .*id*.[firstname.lastname@example.org].NEWS files
- Data Recovery
- Automated decryption tools
- Other software
How to remove NEWS Ransomware from your computer?
We strongly recommend you to use a powerful anti-malware program that has this threat in its database. It will mitigate the risks of the wrong installation, and will remove NEWS ransomware from your computer with all of its leftovers and register files.
Solution for Windows users: our choice is Thor. Thor security scans your computer and detects various threats like NEWS, then removes it with all of the related malicious files, folders and registry keys.
If you are Mac user, we advise you to use Combo Cleaner.
How to decrypt .*id*.[email@example.com].NEWS files?
Once you’ve removed the virus, you are probably thinking how to decrypt .*id*.[firstname.lastname@example.org].NEWS files or at least restore them. Let’s take a look at possible ways of decrypting your data.
Restore .*id*.[email@example.com].NEWS files with Data Recovery
- Download and install Data Recovery
- Select drives and folders with your files, then click Scan.
- Choose all the files in a folder, then press on Restore button.
- Manage export location.
Decrypt .*id*.[firstname.lastname@example.org].NEWS files with other software
Unfortunately, due to the novelty of NEWS ransomware, there are no decryptors that can surely decrypt encrypted files. Still, there is no need to invest in the malicious scheme by paying a ransom. You are able to recover files manually.
You can try to use one of these methods in order to restore your encrypted data manually.
”Decrypt.NEWS files with Emsisoft decryptor”]
This software includes information about more than 100 viruses of STOP(DJVU) family and others. All that you need are two files or some luck. You can freely use it as it distributes free of charge. If it doesn’t work for you, you can use another method.
”Restore.NEWS files with Windows Previous Versions”]
This feature is working on Windows Vista (not Home version), Windows 7 and later versions. Windows keeps copies of files and folders which you can use to restore data on your computer. In order to restore data from Windows Backup, take the following steps:
- Open My Computer and search for the folders you want to restore;
- Right-click on the folder and choose Restore previous versions option;
- The option will show you the list of all the previous copies of the folder;
- Select restore date and the option you need: Open, Copy and Restore.
”Restore.NEWS files with System Restore”]
You can always try to use System Restore in order to roll back your system to its condition before infection infiltration. All the Windows versions include this option.
- Type restore in the Search tool;
- Click on the result;
- Choose restore point before the infection infiltration;
- Follow the on-screen instructions.