What is Cerber Ransomware?

It is a family of the most dreaded Ransomware, which encrypts files on a user’s computer. The algorithm used by this Ransomware for encryption is RSA-2048 key (AES CBC 256-bit encryption). Once the malware is installed on your PC, it will create a random named executable in  Local App Data or App Data or folder.  As soon as the malware is launched, it will scan all drives to encrypt the files. Some of the types of files, Cerber Ransomware encrypts include .doc, .docx, .xls, .pdf, .jpg, .png, .pptx, .ppt, .xlk, .xlsb, .xlsm, .xlsx etc. During the encryption process, the malware adds .cerber to each encrypted file including .cerber2, .cerber3 etc. Random file extensions are also added by some variants of this ransomware such as “.ba99”,”.98a0", ".a37b" etc. Cerber Ransomware

Why it is Considered Extremely Harmful

Once the files are encrypted by this dangerous ransomware, it displays a message stating that your important files, photos & database have been encrypted. To decrypt the same, you need to buy a special type of software. The ransom amount charged is in Bitcoin, which needs to be paid within 7 days of the encryption process failing the amount will be doubled. Encrypted files cannot be opened by normal programs. It is considered extremely harmful as it deletes the shadow volume copies from the target PC, so that the encrypted files cannot be recovered under any circumstance.  In spite of paying the ransom, there is no guarantee that the files can be recovered.

How does Cerber Ransomware Enter a PC?

It can enter a PC via several means such as a malicious link via email or a Trojan accompanied by a software download from an untrusted website. Cybercriminals often send emails pretending to be from legitimate Govt. or private bodies or your banks. These emails come with attachments or links, which carries the malware.

Decrypting Files infected by Cerber Ransomware

Some Cerber ransomware decryptor tool although released by some companies, which can decrypt some versions of this malware but cybercriminals often update the malware to fail any such attempt of restoration.

How to Remove Cerber Ransomware?

You must have antivirus software installed on your PC to remove Cerber Ransomware. REVE Antivirus detects this threat as Trojan.GenericKDZ.39212 and removes the same. However, you should have the antivirus software installed on your computer before any such ransomware attack.

Is Cerber Different from Other Ransomware?

It is quite similar to other forms of ransomware such as CryptoWall, Locky, CryptoLocker, and TeslaCrypt. However, the encryption algorithm and ransom size distinguish these malware from one another. Use REVE Antivirus to keep your PC safe from all types of Ransomware.

Sign Up Button