As you can probably guess, FilesLocker-Christmas Ransomware was distributed sometime around Christmas. The research shows it might have been spread among users speaking English, Chinese, and Russian. After infecting the computer, the malicious application locks user’s private files to make them unusable. Next, it should show information about how to pay a ransom and get a decryptor to unlock your data. The most surprising part is, eventually, the malware’s developers came to a decision to post information allowing to create a decryption tool. IT specialists used this opportunity to develop a tool everyone could download online and use for free. If you have not heard this yet, we encourage you to search for it on the Internet. Of course, as soon as your data gets deciphered, it would be smart to erase FilesLocker-Christmas Ransomware to be safe. The removal instructions located below will explain the process, although if you doubt you will be able to deal with the threat manually, you could employ a reliable security tool instead.
We do not think the malware is still being spread given anyone can decrypt data free of charge. Before the specialists came up with the decryptor, FilesLocker-Christmas Ransomware might have been distributed with malicious software installers, email attachments, etc. In fact, a lot of threats are spread this way, which is why our specialists always advise being careful with content encountered while browsing. If it is an email attachment, users should inspect the sender’s line to check whether the address is known and not forged. Also, all files raising suspicion ought to be scanned with a reliable security tool that could identify whether they are malicious or not. What’s more, it is highly advisable not to download files from torrent and similar file-sharing websites as they might be infected.
The user may not realize FilesLocker-Christmas Ransomware entered the system at first as it should silently start the encryption process, during which the malicious application might encrypt pictures, photos, documents, and lots of other personal files. To mark them the malware adds the .[firstname.lastname@example.org] extension at the end of all files’ titles. Afterward, the threat should quickly reveal its presence by replacing the user’s Desktop wallpaper. Not to mention, it starts playing an audio message that wishes Merry Christmas and explains the files were encrypted. Moreover, our researchers noticed, FilesLocker-Christmas Ransomware should also drop a few text files with ransom notes written in English, Chinese, and Russian. All of the texts should urge users to pay a ransom. Also, the messages promise the user will receive a decryptor soon after making the payment.
Dealing with hackers is risky at all times, as there is always a chance they might scam you. The good news is that in this case you do not have to wonder how such a deal would end, as there is a free decryptor on the Internet. It was created after hackers uploaded decryption keys online. It is difficult to say what made them do this, but whatever the reason was, we would advise you not to miss the opportunity to get your data back. After it is deciphered, you should remove FilesLocker-Christmas Ransomware with the deletion instructions located below or a reliable antimalware tool of your choice.