[email protected] KBK Ransomware - How to remove

{[email protected]}KBK, or just KBK, is a computer virus and a new variant of Globeimposter 2.0. This cryptovirus earns its developer money by locking (encrypting) files on the infected computer and then offering to fix them for a sum of money. Developers of ransomware are also known as online extortionists.

Ransomware is a relevant threat and affects not just Windows computers, like KBK and CryptoLocker do, but also Android phones (DoubleLocker) and even Macs (OSX/Filecoder.E).

If your files were encrypted by KBK, you’ll see that they have a new suffix appended to their names: {[email protected]}KBK.

picture.jpg.{[email protected]}KBK

A ransom note from  the developers of {[email protected]}KBK — called decrypt_files.html — is also created. Here is some of what is in the note:

ALL YOUR IMPORTANT DATA HAS BEEN ENCRYPTED

To decrypt all your files, you need a decryption program.
To get a program to decrypt your data you need to do a few steps:

☑1. To make sure that we can actually decrypt your files. You can send us a file for the test. This can be a picture or a text file. Size less than 5 MB. Send to our mail: [email protected].

☑2. Send your PERSONAL ID in the letter (you will find it at the very beginning of this document)

☑3. We will decode your test file so you are sure. We will also send you the amount you need to pay to get the program to decrypt.

☑4. We will send you instructions on how to pay for the decryption program. After payment, we will send you a program and instructions on how to decrypt all the files.

ATTENTION!

X Only we can decrypt your files.
X Do not try to decrypt your files yourself. You can damage them when trying to restore
X Do not run antivirus!
X Email us: [email protected] immediately so we can help you.
X Decoders other users are ot compatible with your data, because each user’s unique encryption key

To be clear, this note is from the developers of the same virus that encrypted your files. They don’t make it obvious in their note that they’re at fault for {[email protected]}KBK locking your files. KBK developers are not doing you a favour by offering to decrypt the files for a fee — they locked them in the first place.

Unfortunately, the developers of KBK are correct that they’re the only ones who can decrypt them. They’re the only ones who have the private decryption keys. This is why you should not pay for decryption to anyone: in all likelihood, anyone who offers to decrypt the files for a fee will just go to KBK developers and pay them to do it, then charge you even more. Ransomware ransoms are usually a few hundred dollars for one computer, though the KBK price is not revealed in their ransom note.

kbk ransomware

How to remove KBK and restore the files

Emsisoft developed a free decryptor for the GlobeImposter ransomware, but KBK is GlobeImposter 2.0 — a new version, for which the decryptor does not work.

Restoring the files may not be possible because the backups that are stored on the same disk as the encrypted files are most likely encrypted, too. But if you have externally stored backups, those will be fine and you can recover files from them. You could also try to recover some of the deleted files using a program like Data Recovery Pro.

Before restoring the files, make sure that no viruses are left on your computer. Scan it with an antivirus program that you trust, one like Spyhunter. Remove the threats that are found, then restore the files from a backup. If you do decide to pay the ransom, still make sure to scan your computer with an antivirus because malware are often distributed in groups and cybercriminals might take a chance to abuse your computer further.

How KBK infects computers

Spam emails are a common way for ransomware like KBK to be distributed. Malicious attachments or links to a webpage that automatically downloads a malicious file are included in an email. The email likely lays out an impersonal, but urgent-sounding message that encourages you to check out the file/link. If it’s a link to a malicious site included in the spam emails, then fake warnings or fake update messages could be prompting people to download KBK. If it’s a document, it could be an executable — look for concatenated extensions (for example, what looks like “Archive.zip” could actually be “Archive.zip.exe” if you check carefully).

Remote Desktop Protocol is another popular way to spread malware, especially to bigger targets, for example, the computers of a small business. Most often the weak link here is the password, so make sure that yours is complex and unique — that you don’t reuse it for any other accounts online, because passwords can be leaked and get into the hands of cybercriminals.

Malicious ads could also be responsible for leading you to infected websites that spread KBK. Careless torrenting, too, can lead to a ransomware infection.


Automatic Malware removal tools

Download Spyhunter for Malware detection
(Win)

Note: Spyhunter trial provides detection of parasites and assists in their removal for free. limited trial available, Terms of use, Privacy Policy, Uninstall Instructions,

Download Combo Cleaner for Malware detection
(Mac)

Note: Combo Cleaner trial provides detection of parasites and assists in their removal for free. limited trial available, Terms of use, Privacy Policy, Uninstall Instructions, Refund Policy ,

How to recover [email protected] KBK Ransomware encrypted files and remove the virus

Step 1. Restore system into last known good state using system restore

1. Reboot your computer to Safe Mode with Command Prompt:


for Windows 7 / Vista/ XP
  • Start Shutdown RestartOK.
  • Press F8 key repeatedly until Advanced Boot Options window appears.
  • Choose Safe Mode with Command Prompt. Windows 7 enter safe mode

for Windows 8 / 10
  • Press Power at Windows login screen. Then press and hold Shift key and click Restart. Windows 8-10 restart to safe mode
  • Choose TroubleshootAdvanced OptionsStartup Settings and click Restart.
  • When it loads, select Enable Safe Mode with Command Prompt from the list of Startup Settings. Windows 8-10 enter safe mode
 

2.Restore System files and settings.

  • When Command Prompt mode loads, enter cd restore and press Enter.
  • Then enter rstrui.exe and press Enter again.CMD commands
  • Click “Next” in the windows that appeared. Restore point img1
  • Select one of the Restore Points that are available before {[email protected]}KBK has infiltrated to your system and then click “Next”. Restore point img2
  • To start System restore click “Yes”. Restore point img3
 

Step 2. Complete removal of [email protected] KBK Ransomware

After restoring your system, it is recommended to scan your computer with an anti-malware program, like Spyhunter and remove all malicious files related to {[email protected]}KBK. You can check other tools here.  

Step 3. Restore [email protected] KBK Ransomware affected files using Shadow Volume Copies

If you do not use System Restore option on your operating system, there is a chance to use shadow copy snapshots. They store copies of your files that point of time when the system restore snapshot was created. Usually {[email protected]}KBK tries to delete all possible Shadow Volume Copies, so this methods may not work on all computers. However, it may fail to do so. Shadow Volume Copies are only available with Windows XP Service Pack 2, Windows Vista, Windows 7, and Windows 8. There are two ways to retrieve your files via Shadow Volume Copy. You can do it using native Windows Previous Versions or via Shadow Explorer. a) Native Windows Previous Versions Right-click on an encrypted file and select PropertiesPrevious versions tab. Now you will see all available copies of that particular file and the time when it was stored in a Shadow Volume Copy. Choose the version of the file you want to retrieve and click Copy if you want to save it to some directory of your own, or Restore if you want to replace existing, encrypted file. If you want to see the content of file first, just click Open.
Previous version
b) Shadow Explorer It is a program that can be found online for free. You can download either a full or a portable version of Shadow Explorer. Open the program. On the left top corner select the drive where the file you are looking for is a stored. You will see all folders on that drive. To retrieve a whole folder, right-click on it and select “Export”. Then choose where you want it to be stored.
Shadow explorer

Step 4. Use Data Recovery programs to recover [email protected] KBK Ransomware encrypted files

There are several data recovery programs that might recover encrypted files as well. This does not work in all cases but you can try this:
  • We suggest using another PC and connect the infected hard drive as slave. It is still possible to do this on infected PC though.
  • Download a data recovery program.
  • Install and scan for recently deleted files. Data Recovery Pro
Note: In many cases it is impossible to restore data files affected by modern ransomware. Thus I recommend using decent cloud backup software as precaution. We recommend checking out Carbonite, BackBlaze, CrashPlan or Mozy Home.
Leave a Reply

Your email address will not be published. Required fields are marked *