Howareyou Ransomware

Howareyou Ransomware Description

The Howareyou Ransomware has been determined to be a unique crypto locker threat that doesn't belong to any of the pre-existing ransomware families. Its goals are that of a typical threat from this malware type, though.

The Howareyou Ransomware tries to sneak itself onto the user's computer without triggering any alarm bells. Then, the Howareyou Ransomware proceeds to encrypt nearly all of the most widely used filetypes stored on it. Users will no longer be capable of access their documents, music, video, photos, PDFs, datasheets, etc. The consequences could be devastating if the affected files are related to business-projects. Every encrypted file will have its original name modified as '.howareyou' will be appended to it as a new extension. As for the note with instruction from the hackers, the Howareyou Ransomware drops it as a text file named '__read_me_.txt.'

The note's instructions show that the cybercriminals who developed the threat are following the recent trends among ransomware creators and have equipped the Howareyou Ransomware with the functionality to exfiltrate data before initiating the encryption process. As a result, the criminals obtain additional leverage with which to extort their victims. Indeed, they threaten to start leaking the collected data if their demands are not met. To get the ransom's exact price, affected users are supposed to establish contact by sending a message to the 'dfkjhdkjsdjfgkjdsfhkjskdjfhkj@cock.li' email address. They also can attach up to two files to be decrypted for free.

The full set of instruction delivered by the Howareyou Ransomware is:

'Your files have been encrypted and copied to our private servers!

ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE WILL PERMANENTLY CORRUPT IT.

DO NOT MODIFY ENCRYPTED FILES.

DO NOT RENAME ENCRYPTED FILES.

But keep calm! There is a solution for your problem!

For some money reward we can decrypt all your encrypted files.

Also we will delete all your private data from our servers.

To prove that we are able to decrypt your files we give you the ability to decrypt 2 files for free.

So what is you next step ? Contact us for price and get the decryption software.

Our Mail: dfkjhdkjsdjfgkjdsfhkjskdjfhkj@cock.li

Your ClientId: -

We would share your SENSITIVE DATA in case you refuse to pay.'

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.


HTML is not allowed.