LambdaLocker Ransomware

LambdaLocker Ransomware Description

The LambdaLocker Ransomware is a ransomware Trojan that was uncovered in January 2017. The LambdaLocker Ransomware will use a combination of the AES-256 and SHA-256 encryption to make the victim's files inaccessible. The files encrypted using the LambdaLocker Ransomware will be identified by the file extension '.lambda_l0cked.' The LambdaLocker Ransomware then drops a ransom note in the form of an HTML file named 'READ_IT.hTml' on the victim's Desktop.

There's no an Available Decryptor for the LambdaLocker Ransomware

The LambdaLocker Ransomware's ransom note delivers a message that is both in English and Chinese. This makes it likely that the LambdaLocker Ransomware infection is designed to target computer users in China. According to the LambdaLocker Ransomware's ransom note, the victim's must pay 0.5 BitCoin (approximately $450 USD) to recover the affected files. Unfortunately, the files that have been encrypted by the LambdaLocker Ransomware cannot be restored with current technology. The same technology that allows computer users to communicate online and software creators to keep their code private securely also allows these people to blackmail computer users by encrypting their files. According to the LambdaLocker Ransomware ransom note, if the ransom is not paid before a month is over, the files will be lost permanently. PC security researchers strongly advise computer users against paying the LambdaLocker Ransomware ransom. In many cases, con artists will ignore the victims entirely or even ask for more money. It is crucial to take preemptive measures to ensure that your files and computer are protected from threats like the LambdaLocker Ransomware completely.

Below is the entire text of the LambdaLocker Ransomware ransom note:

Your files are encrypted by the LambdaLocker.
Your ID : -
We used AES-256 and SHA-256 cipher to encrypt.So DO NOT try to crack your files.
The way to DECRYPT:
Step1 : pay 0.5 Bitcoin to: 1MJodDvhmNG9ocRhhwvBzkGmttXP9ow7e2 Case Sensitive Please copy this address in 1 month
Step2 : send an E-MAIL to after you finish step 1
Please wait. We will send the decrypter and the key to you in 3 hours.
How to get Bitcoins and pay?
1.Register a Bitcoin Trade Platform.
2.Buy Bitcoins through the platform.
3.Pay 0.5 Bitcoins to 1MJodDvhmNG9ocRhhwvBzkGmttXP9ow7e2 and follow the decrypt step.
If you can't understand, please Google: How can I buy and pay bitcoin?
If you have any questions,please e-mail

您的所有文件已经被the LambdaLocker加密
您的ID : -
第一步:在 个月内 支付 0.5比特币 到地址 1MJodDvhmNG9ocRhhwvBzkGmttXP9ow7e2 区分大小写 请完整地复制
邮件内容:[您的ID]P05 (举例:[1234-1234-1234]P05)

Protecting Your computer Against the LambdaLocker Ransomware

The best preemptive measure computer users can take to prevent the LambdaLocker Ransomware infections is to have backup copies of all files. Having backups of all files makes computer users immune to the LambdaLocker Ransomware attack completely since there is no reason to pay the ransom if the computer users can simply recover the files from a backup copy. A reliable security program and extra precautions when handling unsolicited email attachments will protect computer users from the LambdaLocker Ransomware completely and minimize the damage in case of an infection.

Site Disclaimer is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.