Creeper ransomware - How to remove

Creeper ransomware virus was discovered at the very end of February, 2018. It is an infection which encrypts files with AES algorithm (just like MBRLock virus) and appends .creeper extension to the damaged digital data. According to the specialists, this is one of the few crypto-viruses that demand ransoms in Monero crypto-currency (Criminals choosing cryptocurrencies like Monero, ZCash and Dash over Bitcoin, Europol warns) instead of Bitcoin.

Creeper crypto-virus encrypts data and asks for Monero

Previously, we have discussed BugWare and OhNo! crypto-infections, requiring Monero. At first, the fee for a decryption tool is 3 Monero ($878.68 USD). However, after three days, it increases to 5 Monero ($1,464.47 USD). This information, together with the payment address, is found in DECRIPT_MY_FILES.txt file.

Creeper ransomware

All things considered, this Creeper ransomware does not appear to be a very high-risk threat. We do not think that it will start causing havoc for thousands of people as the distribution of the virus appears rather slow. However, there might be some victims that will have to fight this ransomware. However, if your digital data starts featuring .creeper extension, remember that paying the ransom is not the right solution (Paying the WannaCry ransom will probably get you nothing. Heres why).

Is there any way of recovering data that Creeper ransomware has ruined?

Currently, we have not found any indications that the crypto-virus is decryptable. However, it was detected only few days ago, meaning that security specialists might have not had the time to analyze the infection in more detail. Since this does not appear to be a very sophisticated virus, we are hoping that the creating the free decryption tool won’t be issue. However, if you have become infected with this parasite, we suggest removing the Creeper from your device.

If victims do not pay the ransom in six days, hackers are threatening to permanently delete the decryption key. After that, crooks won’t be able to help you restore the encrypted digital data. Nevertheless, there are no promises that criminals will recover your data even if you do pay the ransom. Some hackers disappear after the fees are sent to their wallets.

The best option would be to store your digital data in backup storages beforehand. Please follow this advice as almost anyone can become a victim of ransomware. If you will be able to retrieve your files from an alternative source, there will be no need to pay the ransom for decryption key.

How is Creeper ransomware distributed? Tips on staying safe

Creeper ransomware might be spread in a number of ways. Hackers could send malicious email letters, featuring suspicious files. If you download a file from a random message, you could accidentally get a payload of ransomware. Therefore, please do not open email messages from unknown sources. In most cases, hackers send malspam, pretending to address very serious security issues.

Also, you should know that online advertisements can also play a huge part in the distribution of ransomware. Fake Adobe Flash Player updates and other rogue messages can easily trick you into downloading malicious files. Please do not click on online content that features such offers. If you do, you might download a ransomware, a Trojan or another disturbing infection.

Creeper ransomware virus is a severe infection that you have to take care of immediately. Removing crypto-malware manually is pretty tricky: only experiences users should choose this option. A better solution is to run a scan with an anti-malware tool. Such security programs will find the source of this infection and offer its quick removal. All you will have to do is sit and wait until the crypto-virus (and everything related to it) is removed. Spyhunter will protect your device with the utmost attention to every detail. If you do not want to be bothered by this infections, installing this tool is the right way to go.

How to recover Creeper ransomware encrypted files and remove the virus

Step 1. Restore system into last known good state using system restore

1. Reboot your computer to Safe Mode with Command Prompt:


for Windows 7 / Vista/ XP
  • Start Shutdown RestartOK.
  • Press F8 key repeatedly until Advanced Boot Options window appears.
  • Choose Safe Mode with Command Prompt. Windows 7 enter safe mode

for Windows 8 / 10
  • Press Power at Windows login screen. Then press and hold Shift key and click Restart. Windows 8-10 restart to safe mode
  • Choose TroubleshootAdvanced OptionsStartup Settings and click Restart.
  • When it loads, select Enable Safe Mode with Command Prompt from the list of Startup Settings. Windows 8-10 enter safe mode
 

2.Restore System files and settings.

  • When Command Prompt mode loads, enter cd restore and press Enter.
  • Then enter rstrui.exe and press Enter again.CMD commands
  • Click “Next” in the windows that appeared. Restore point img1
  • Select one of the Restore Points that are available before Creeper ransomware has infiltrated to your system and then click “Next”. Restore point img2
  • To start System restore click “Yes”. Restore point img3
 

Step 2. Complete removal of Creeper ransomware

After restoring your system, it is recommended to scan your computer with an anti-malware program, like Spyhunter and remove all malicious files related to Creeper ransomware . You can check other tools here.  

Step 3. Restore Creeper ransomware affected files using Shadow Volume Copies

If you do not use System Restore option on your operating system, there is a chance to use shadow copy snapshots. They store copies of your files that point of time when the system restore snapshot was created. Usually Creeper ransomware tries to delete all possible Shadow Volume Copies, so this methods may not work on all computers. However, it may fail to do so. Shadow Volume Copies are only available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8. There are two ways to retrieve your files via Shadow Volume Copy. You can do it using native Windows Previous Versions or via Shadow Explorer. a) Native Windows Previous Versions Right-click on an encrypted file and select PropertiesPrevious versions tab. Now you will see all available copies of that particular file and the time when it was stored in a Shadow Volume Copy. Choose the version of the file you want to retrieve and click Copy if you want to save it to some directory of your own, or Restore if you want to replace existing, encrypted file. If you want to see the content of file first, just click Open.
Previous version
b) Shadow Explorer It is a program that can be found online for free. You can download either a full or a portable version of Shadow Explorer. Open the program. On the left top corner select the drive where the file you are looking for is a stored. You will see all folders on that drive. To retrieve a whole folder, right-click on it and select “Export”. Then choose where you want it to be stored.
Shadow explorer

Step 4. Use Data Recovery programs to recover Creeper ransomware encrypted files

There are several data recovery programs that might recover encrypted files as well. This does not work in all cases but you can try this:
  • We suggest using another PC and connect the infected hard drive as slave. It is still possible to do this on infected PC though.
  • Download a data recovery program.
  • Install and scan for recently deleted files. Data Recovery Pro
Note: In many cases it is impossible to restore data files affected by modern ransomware. Thus I recommend using decent cloud backup software as precaution. We recommend checking out Carbonite, BackBlaze, CrashPlan or Mozy Home.
Leave a Reply

Your email address will not be published. Required fields are marked *