CryptoViki Ransomware is a ransomware-type infection that was first spotted at the beginning of May 2017. Apparently, this program is like many other ransomware-type programs as it was designed to encrypt your files. After encrypting your files, this program asks you to purchase a decryption key that only this program’s developers have as this application was configured to generate unique encryption algorithms for each victim. While there may not be a way to decrypt your files for free, you should remove this program, and you can learn how to do that by reading this article, so we invite you to continue reading.
CryptoViki Ransomware can be distributed in many ways, however, it has yet to be fully established which methods are actually used. Like most ransomware-type applications, this particular program can be distributed through malicious email attachments, and the emails can be disguised as legitimate. The emails can feature this ransomware in a zipped file archive or contain a links to its direct download. Nevertheless, it is also possible that this program can be bundled with pirated software and distributed on piracy websites. Moreover, certain websites can be hacked and injected with exploit kits that download CryptoViki Ransomware secretly. There are many likely scenarios for distributing this particular program, but there is no concrete evidence to confirm any one of the possibilities outlined here.
If your PC becomes infected with this CryptoViki Ransomware, then it will start to encrypt your files immediately. This program uses a combination of AES and RSA encryption algorithms to generate an encryption key and decryption key. The decryption key is sent to a remote server, and only that particular key can be used to decrypt the encryption key. While encrypting your files, this program will append the encrypted files with a “.viki” file extension. It encrypts files in all connected drives on your PC, and it encrypts most file formats. However, it should exclude files and folders that are vital to keeping Windows OS running. Lastly, the ransomware changes the desktop wallpaper image with an image both in English and Russian that asks you to open readme.txt for additional information.
readme.txt features an email address, firstname.lastname@example.org, to which you have to send a message to receive instructions on how to pay the ransom and decrypt your files. The text inside the ransom note is again written in English and Russian. The note warns users of irreversible damage to their files if they attempt to crack the encryption using a third-party decryption tool. However, you should not trust cyber criminals to keep their word and send you the decryption key as they can take your money and forget all about sending you the key. Furthermore, the amount to be paid is not specified anywhere so it may vary with each case. Therefore, we invite you to delete this ransomware instead of complying with the cyber criminals’ demands.
In closing, it is plain to see that CryptoViki Ransomware is one nasty computer infection that can ruin for files for good. There is no free decryption tool at the moment, so if you worry about your PC being vulnerable to it, then you should get an anti-malware tool such as SpyHunter to protect it. If, however, your PC has already been infected, then you should not hesitate and remove this ransomware.