LoryEstside ransomware removal instructions
What is LoryEstside?
Discovered by Cyber Security, LoryEstside is a new variant of BitPaymer ransomware. Most ransomware-programs are designed to encrypt data and block access to it unless a ransom is paid. LoryEstside adds the ".locked!" extension to every encrypted file. For example, "1.jpg" becomes "1.jpg.locked!". It also generates a text file (ransom message) for each encrypted file. The ".txt" extension must be manually added to the filenames to open the files. For instance, LoryEstside creates a "1.jpg.readme_txt" text file for a file called "1.jpg". To open this file, it must be renamed to "1.jpg.readme_txt.txt", and so on. All of these text files contain an identical ransom demand message.
The ransom messages contain identical information and state that all files were encrypted with a strong (cryptography) algorithm. Any data backups stored on the computer were also encrypted or deleted. Users of affected/infected computers are urged not to restart their systems or rename or delete the encrypted or "readme" files. According to cyber criminals, any of these actions might lead to permanent data loss (files might be lost, making it impossible to recover them). To receive information regarding decryption, LoryEstside victims are encouraged to contact the developers via the loryEstside@protonmail.com email address. This ransom message contains a Bitcoin wallet address, making it clear that the ransom must be paid using this cryptocurrency. Cyber criminals offer free decryption of two random files as a gesture of their honest intentions and 'proof' that they can be trusted. Files for free decryption should have the ".locked" and ".readme_txt" extensions of each file also included. It is possible that LoryEstside's developers will decrypt these files free of charge, however, this does not mean that they can be trusted. Cyber criminals generally provide none of the promised decryption keys/tools. In many cases, ransomware victims pay the ransom and are then scammed. Transferring money (cryptocurrency) to cyber criminals will not deliver any positive outcome. Unfortunately, most ransomware programs are 'uncrackable': developers use cryptographies that generate unique keys and no other tools are capable of decryption. They store these keys on remote severs accessible only by them. If a data backup has been created, we recommend that you use it to restore everything. We strongly advise against contacting these cyber criminals or making any payments.
Screenshot of a message encouraging users to pay a ransom to decrypt their compromised data:
The number of ransomware-type programs is growing daily, however, most are very similar. Some examples of other infections of this type include PC-FunHACKED!, Paradise .xyz, and Rumba. Generally, they prevent people from accessing their files through encryption, unless a ransom is paid. Common differences between these programs are cryptography algorithms used to encrypt data and cost of decryption tool/key. Unfortunately, most of these infections are impossible to 'crack' unless, in some cases, they are not fully developed or have bugs/flaws that can be exploited to restore data. Therefore, we recommend that you generate regular backups and store them on remote servers or unplugged storage devices. If not, backups might be encrypted together with other data stored on the computer.
How did ransomware infect my computer?
To proliferate ransomware (and other infections), cyber criminals often use spam email campaigns, trojans (malicious programs), fake software updaters, dubious/untrustworthy software download sources, Windows and various other software cracks. Spam campaigns are used to proliferate malware by employing malicious attachments. These are usually presented as Microsoft Office documents, archive files (RAR, ZIP), PDF files, executable files, and so on. Once opened/executed, they download and install malicious programs and infect operating systems. Trojans are computer infections that proliferate other malware to cause chain infections. If a trojan is installed, it probably also caused the LoryEstside infection. Fake software updaters infect systems by downloading malicious software rather than the expected updates, or by exploiting outdated software bugs and flaws. Untrustworthy software download tools such as peer-to-peer networks (torrents, eMule, and other such tools), various third party downloaders, free file hosting, freeware download websites etc., are often used to present malicious executables as legitimate software. Cyber criminals use these channels to trick people into downloading and installing malicious programs manually.
How to protect yourself from ransomware infections?
To avoid computer infections with malicious programs, Take precautions when browsing the web, downloading, installing and updating software. Download software from official and trustworthy sources only, and using direct links. Avoid using third party sources when downloading software - they are often used to proliferate rogue applications. It is important to keep software updated, however, use implemented tools or functions provided by official software developers. Tools such as third party software updaters should not be used. Do not open email attachments without carefully studying them first. Do not open attachments presented in emails that are received from unknown, suspicious addresses. Finally, reputable anti-virus/anti-spyware software can detect and remove threats before they can do any harm. If your computer is already infected with LoryEstside, we recommend running a scan with Spyhunter for Windows to automatically eliminate this ransomware.
Text presented in all LoryEstside ransomware text files:
Your network has been penetrated.
All files on each host in the network have been encrypted with a strong algorythm.
Backups were either encrypted or deleted or backup disks were formatted.
No free decryption software is available in the public.
DO NOT RESET OR SHUTDOWN - files may be damaged.
DO NOT RENAME the encrypted and readme files.
DO NOT MOVE the encrypted and readme files.
DO NOT DELETE readme files.
This may lead to the impossibility of recovery of the certain files.
To get info(pay-to-decrypt your files) contact us at:
To confirm our honest intentions.
Send 2 different random files and you will get it decrypted.
It can be from different computers on your network to be sure we decrypts everything.
Files should have both .locked and .readme_txt extensions of each included.
2 files we unlock for free
Screenshot of files encrypted by LoryEstside (".locked" extension):
LoryEstside ransomware removal:
Instant automatic removal of LoryEstside virus:
Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Spyhunter is a professional automatic malware removal tool that is recommended to get rid of LoryEstside virus. Download it by clicking the button below:
- What is LoryEstside?
- STEP 1. LoryEstside virus removal using safe mode with networking.
- STEP 2. LoryEstside ransomware removal using System Restore.
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in "Safe Mode with Networking":
Windows 8 users: Start Windows 8 is Safe Mode with Networking - Go to Windows 8 Start Screen, type Advanced, in the search results select Settings. Click Advanced startup options, in the opened "General PC Settings" window, select Advanced startup. Click the "Restart now" button. Your computer will now restart into the "Advanced Startup options menu". Click the "Troubleshoot" button, and then click the "Advanced options" button. In the advanced option screen, click "Startup settings". Click the "Restart" button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in "Safe Mode with Networking":
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click "Restart" while holding "Shift" button on your keyboard. In the "choose an option" window click on the "Troubleshoot", next select "Advanced options". In the advanced options menu select "Startup Settings" and click on the "Restart" button. In the following window you should click the "F5" button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in "Safe Mode with Networking":
Log in to the account infected with the LoryEstside virus. Start your Internet browser and download a legitimate anti-spyware program. Update the anti-spyware software and start a full system scan. Remove all entries detected.
If you cannot start your computer in Safe Mode with Networking, try performing a System Restore.
Video showing how to remove ransomware virus using "Safe Mode with Command Prompt" and "System Restore":
1. During your computer start process, press the F8 key on your keyboard multiple times until the Windows Advanced Options menu appears, and then select Safe Mode with Command Prompt from the list and press ENTER.
2. When Command Prompt mode loads, enter the following line: cd restore and press ENTER.
3. Next, type this line: rstrui.exe and press ENTER.
4. In the opened window, click "Next".
5. Select one of the available Restore Points and click "Next" (this will restore your computer system to an earlier time and date, prior to the LoryEstside ransomware virus infiltrating your PC).
6. In the opened window, click "Yes".
7. After restoring your computer to a previous date, download and scan your PC with recommended malware removal software to eliminate any remaining LoryEstside ransomware files.
To restore individual files encrypted by this ransomware, try using Windows Previous Versions feature. This method is only effective if the System Restore function was enabled on an infected operating system. Note that some variants of LoryEstside are known to remove Shadow Volume Copies of the files, so this method may not work on all computers.
To restore a file, right-click over it, go into Properties, and select the Previous Versions tab. If the relevant file has a Restore Point, select it and click the "Restore" button.
If you cannot start your computer in Safe Mode with Networking (or with Command Prompt), boot your computer using a rescue disk. Some variants of ransomware disable Safe Mode making its removal complicated. For this step, you require access to another computer.
To protect your computer from file encryption ransomware such as this, use reputable antivirus and anti-spyware programs. As an extra protection method, you can use programs called HitmanPro.Alert and EasySync CryptoMonitor, which artificially implant group policy objects into the registry to block rogue programs such as LoryEstside ransomware.
Note that Windows 10 Fall Creators Update includes a "Controlled Folder Access" feature that blocks ransomware attempts to encrypt your files. By default, this feature automatically protects files stored in the Documents, Pictures, Videos, Music, Favorites as well as Desktop folders.
Windows 10 users should install this update to protect their data from ransomware attacks. Here is more information on how to get this update and add an additional protection layer from ransomware infections.
HitmanPro.Alert CryptoGuard - detects encryption of files and neutralises any attempts without need for user-intervention:
Malwarebytes Anti-Ransomware Beta uses advanced proactive technology that monitors ransomware activity and terminates it immediately - before reaching users' files:
- The best way to avoid damage from ransomware infections is to maintain regular up-to-date backups. More information on online backup solutions and data recovery software Here.
Other tools known to remove LoryEstside ransomware: