Crypto-Blocker Ransomware is a new threat which was initially spotted at the beginning of May, 2017. It is not a popular threat yet, and to be frank, we do not think that it will ever be if it is not updated because it does not work properly. Researchers at 411-spyware.com have managed to find out that it encrypts files just like other ransomware infections do; however, it performs this activity in one folder which, frankly speaking, rarely contains valuable data. The second disturbing fact about it is that it does not provide any email address or instructions explaining how to make a payment for the decryption of files, so its developers could not obtain money from users and users themselves could not purchase the key for unlocking files. Of course, users rarely get a decryptor in exchange for sending a ransom to cyber criminals and, actually, it is not advisable to make a payment, but there is no doubt that all ransomware infections, except for those which are developed for educational purposes, seek to obtain money from users, and researchers find it peculiar when they detect a threat working somehow differently, as in the case of Crypto-Blocker Ransomware. In most cases, buggy infections or beta versions of threats do not work properly, but, of course, they might be fixed. We do not know what will happen with Crypto-Blocker Ransomware in the future, but we surely know that you need to go to delete it from your computer as soon as possible.
Although Crypto-Blocker Ransomware is not a sophisticated infection, it works quite well, and it might even lock some of your important files if they are located in %APPDATA%\Temp. Those files it encrypts receive a new extension .corrupted, so it will not be a problem to find out which of them have been affected by this malware. Once the encryption process is finished, it then launches a window with a ransom note. It contains a short message explaining why users see this window and what they can do to close it once and for all. Like other ransomware infections, it demands a ransom of 10 dollars/pounds/euros/etc. Users are also told that they must make a payment within 5 hours if they do not want to find their computers completely ruined. As mentioned above, sending money to cyber criminals is a bad idea, but it would not be possible to do that even if you wanted to make a payment because you would not know where to send your money. Crypto-Blocker Ransomware not only hides information about the payment, but it is also impossible to contact cyber criminals behind it, i.e. no email address is provided. Do not worry; it does not mean that you cannot decrypt your files if you cannot transfer the required money. A free decryptor has been developed by specialists, so go to get it from the web and then use it to decrypt those files having the .corrupted extension.
If you are wondering how Crypto-Blocker Ransomware has entered your computer, you should know that there are several strategies usually used to spread ransomware infections. First, they can be spread via spam emails. Of course, these threats do not show up on computers the moment users open their emails, but they surely do not hesitate to enter systems if users open attachments they find in these emails or click on malicious links sent to them. It is one of the most frequently-used methods, but, we can assure you that it is not the only one. Researchers have also managed to find out that ransomware infections might be available for download on untrustworthy pages containing tons of free software. It is very likely that they are presented as useful software and users download them voluntarily or they enter users’ PCs next to other applications promoted on these websites. We do not think that it is very easy to prevent ransomware infections from entering the system, so we recommend installing security software. If it will be enabled, no threats could sneak onto your computer without your approval.
You will get rid of Crypto-Blocker Ransomware fully if you find its malicious file and delete it. It might be located anywhere, but we suggest that you start looking for it by checking %USERPROFILE%\Desktop, %USERPROFILE%\Downloads, %TEMP%, and %APPDATA% directories. If you cannot find it, use an automatic scanner. In fact, it is not the only thing you have to do – you also need to enable the Task Manager – it has been disabled by this ransomware infection. Some automatic scanners fix it for users, but, most probably, you will have to do this job yourself. You are welcome to use our instructions.
Delete Crypto-Blocker Ransomware
Enable the Task Manager