Alphabet Ransomware is a computer infection that seeks to obtain money from users. In order to get money from people, it locks Desktop by placing a window claiming that “all your documents are encrypted with the strongest encryption algorithm.” Also, users are informed that the only way to decrypt those files is to purchase a special decryption key from cyber criminals. Even though the window left by Alphabet Ransomware says that the most valuable data (e.g. pictures and documents) is encrypted, the truth is that it is not. Of course, users believe that the situation is very serious because they cannot access their Desktops. Even though, at the time of writing, this computer infection does not encrypt users’ files, it might start doing that anytime soon, so we cannot promise that you will find your files intact too if you encounter this threat after some time. Either way, make sure you go and delete Alphabet Ransomware from the system as soon as possible.
Alphabet Ransomware does not seem to be working well because it does not encrypt files like other similar computer infections do. It seems that it only seeks to scare users into thinking that their files are encrypted and they have to pay money now by placing a screen-locking window on Desktop. At the time of writing, it demands a ransom of 1 Bitcoin (approximately 900 USD) in exchange for the decryption tool. As has already been mentioned, Alphabet Ransomware should not encrypt users’ files, so there is a huge possibility that you do not even need the decryption tool. Actually, the version specialists at 411-spyware.com have tested does not provide a Bitcoin address (it is necessary to know it to make a payment) to users, which means that it is impossible to transfer money too. You just need to remove Alphabet Ransomware if you have encountered a version that does not encrypt files; however, if it happens that you have encountered a new version of this ransomware infection and all your files are encrypted, you should try to recover your files after the deletion of this threat. There is, unfortunately, not much you can do if you are not going to pay money cyber criminals require, but you should still try out all free data recovery tools available for download on the web. Alternatively, you can go to recover your files from a backup if you have created it before entering this ransomware infection.
There is no doubt that Alphabet Ransomware enters computers illegally. Specialists say that, most probably, this happens when users open attachments they find in spam emails. Once the malicious file is launched, a window “Preparing update…” imitating the genuine Windows OS window is opened. Even though it has the Windows OS logo, it has nothing to do with the Microsoft Corporation. Actually, it is not the only threat that opens such a legitimate-looking window. Our researchers who encounter ransomware infections every day say that other similar threats perform this activity too. In most cases, they open such a window and then start encrypting users’ files. Once they finish doing that, they open a window with a ransom note for users. Unfortunately, file-encrypting threats are very prevalent these days, so you should be careful in order not to encounter a similar malicious application ever again. First of all, you should install a security application and keep it active 24/7. Second, you should ignore all emails that appear in the spam email folder. Be careful with third-party applications on P2P websites too because they often come with untrustworthy software.
No matter Alphabet Ransomware has encrypted your files or not, you need to go to delete this infection from the system if you have already encountered it. First of all, you have to remove a screen-locking window from Desktop. Second, you have to find and delete the malicious file you have opened. It should be located in %USERPROFILE%\Downloads, but you might find it in other places, e.g. Desktop too. If it happens that you cannot find this file, scan your PC with an automatic malware remover, e.g. SpyHunter. This antimalware scanner can be downloaded with the click on the Download button placed below this article.