How to Remove Petya Ransomware and Recover Data

How to Remove Petya Ransomware and Recover Data

Petya is a new and powerful ransomware that targets and encrypts the Master Boot Record (MBR) of the compromised computer, replacing it with a malicious loader. The MBR contains information that loads the Operating System on a computer which can’t load with OS). The malware forces Windows to reboot and demands 0.9 Bitcoin in return for the decryption key, or about $390 USD as of April 2016.

Petya is distributed through emails that are written in a very polite manner, and with proper grammar. The email, presented as coming from an applicant for a job position, contains a Dropbox link. This link supposedly leads to a CV, or some other important document, that is too big to be sent as an attachment. If a user opens it, the virus captures the computers. Instead of loading an Operating System, a message loads requesting the ransom, accompanied by an image of a skull generated on ASCII. Instructions are then loaded on the screen, telling users to use the Tor network to pay the ransom.

Petya claims to use a military encryption algorithm. The origin of the ransomware is unknown, although the name Petya is a common name in Russia, Bulgaria, and a few other countries with Slavic population. On the other hand, Petya and the Wolf (Op. 67), is a well-known composition written by Soviet composer Sergei Prokofiev in 1936 in the USSR. It is a children’s story, spoken by a narrator and accompanied by an orchestra.

Note that the Petya ransomware can also be distributed via social networks or file sharing services, asking users to open the link.

Here is how the message reads: “You have become a victim of the Petya Ransomware. The hard disks of your computer have been encrypted with a military grade encryption algorithm. There is no way to restore your data without a special key. You can purchase this key on the dark net page shown in step 2. To purchase your key and restore your data, please follow these three easy steps:

  1. Download the Tor Browser at (URL address). If you need help, please google “access onion page”.
  2. Visit one of the following pages with the Tor Browser: (URL addresses).
  3. Enter your personal decryption code there: (random code).

If you already purchased your key, please enter it below.”

Contacting the ransomware creators is unlikely to help. No one can guarantee that you will have your data and drives unlocked and restored. Paying the makers of the ransomware encourages them to create new ransomwares. There is no guarantee that you will get your computer back.

Unfortunately, there are currently no known ways exist to repair the Master Boot Record. Thus, the damage may be irreparable and your disk drive may remain locked forever.

­See also:

  • Apple Encyclopedia: all information about company, products, electronic devices, operating systems and apps.
  • iGotOffer.com: the best place to sell my used Apple device online for the top price. Free quote, free shipping. BBB A+ rated business.

Credit photo: Photograph in public domain

Share
Published by
Steve

Recent Posts

Scams on WhatsApp: Cybercriminals Impersonate the Voices

Thousands of Scams on WhatsApp: They Impersonate the Voices of Your Parents and Best Friends,…

3 weeks ago

Credential Stuffing: Increasingly Devastating in France

Credential Stuffing: Increasingly Devastating in France This formidable technique explains the surge in cyberattacks in…

4 weeks ago

Users Report Hearing Strange Voices on Their iPhones

Mysterious Case: Users Report Hearing Strange Voices on Their iPhones Affected phones may have privacy…

1 month ago

Xiaomi Announced Poco C75 Mid-range Smartphone

Xiaomi Announced Poco C75 Mid-range Smartphone The Poco C75 is a newly announced mid-range smartphone…

1 month ago

Meta Tests to Implement Facial Recognition Technology

Meta Conducts Tests to Implement Facial Recognition Technology Meta, the company behind social media platforms…

2 months ago

The Best Apple Intelligence Features in iOS 18.1

The 5 Best Apple Intelligence Features You Can Try in iOS 18.1: Experience Apple Intelligence…

3 months ago