If your personal files were encrypted by the malicious FlatChestWare Ransomware, the chances are that you will not be able to recover them. Why? That is because the infection uses a complex encryption algorithm to compromise them, and only a special decryption key can help recover them. This key, of course, is protected by the creator of the malicious ransomware, and they will not give it to you. What if you fulfill the demands and pay the ransom requested for it? Even then the decryptor is unlikely to be given to you. Needless to say, there is not much you can do once your files are corrupted, and so we strongly recommend strengthening the protection of your operating system and files if you still have time. If the infection has slithered in and encrypted files already, you need to focus on removing it. In this report, we discuss all things regarding this threat, and you can also find information explaining how you can delete FlatChestWare Ransomware from your operating system.
According to our researchers, FlatChestWare Ransomware could be executed by users who open corrupted spam email attachments. Also, remote Desktop connections could be used, in which case, remote access vulnerabilities are exploited. Although it is unlikely that the ransomware is running because of or along with other infections, it is wise to inspect the operating system to check if other threats require removal after the ransomware itself is removed. Without a doubt, FlatChestWare Ransomware is an infection that deserves full attention, especially since it plasters itself all over your screen. First, it displays a Windows Update message that is completely bogus. Unfortunately, it looks like the real deal, and users are likely to click the “Restart Now” button that it displays. After that, the infection opens a window that reveals itself. This window displays an image of an animated girl, but the most important part is the message that it delivers. This is likely to be the first time you realize that a malicious infection has managed to invade and corrupt your personal files.
The message that FlatChestWare Ransomware introduces you to informs that you cannot remove the “program” or do anything to decrypt files because that, allegedly, would make your files unrecoverable. Additionally, it instructs to click the “Help” button. The information on this page suggests that you must pay a ransom of 150 USD in Bitcoins by transferring it to 1PFms6LMmamjPE3VCFB83Yfa5TaoDdsjrB. This Bitcoin Wallet was created by cyber criminals to collect the money that FlatChestWare Ransomware victims should transfer. Of course, when you discover a message like that, the first thing you need to do is find your files and check if they are encrypted. Unfortunately, this particular ransomware can encrypt files, and when it does, it attaches the “.flat” extension to their names. Explorer Ransomware, BrainLag Ransomware, Oxar Ransomware, and other threats that come from the Hidden Tear family act in similar ways. Note that FlatChestWare Ransomware belongs to this family as well. Unfortunately, if these threats invade operating systems and corrupt personal files, it is very unlikely that recovering them is possible. The ransom payment is unlikely to help with anything, and legitimate file decryptors are unlikely to assist either. Of course, you should look into the latter option just in case a tool was created recently.
It should come as no surprise that removing FlatChestWare Ransomware is extremely important. While this threat is unlikely to cause harm beyond the encryption of files, it is controlled by cyber criminals, and they are unpredictable. Since trusting them is a bad idea, you must understand why paying a ransom is not something we recommend either. If you pay it, you are likely to end up wasting money on something that will never be provided to you. Hopefully, backups exist, and you can recover files from them after you delete FlatChestWare Ransomware. Speaking of that, our researchers strongly recommend employing anti-malware software. While erasing this malware using the instructions below should not be difficult, anti-malware software is also capable of ensuring full-time protection against threats that could spread in the future. Needless to say, that is something you must take into consideration.