Remove Cat4er Ransomware

Cat4er Ransomware is a new file-locker, which has the ability to destroy your files by applying a strong encryption to their contents. Thankfully, it is not wiper malware, and these files can be recovered as long as you have access to the unique decryption key that the Cat4er Ransomware generates for each victim. There is a catch though – this ransomware is not compatible with free decryptors. This means that its encryption routine cannot be reverse-engineered or cracked. Because of this, the only way to decrypt the data is to recover the unique key from Cat4er Ransomware's creators.

Of course, the criminals behind this attack are not willing to help their victims for free. Instead, they offer to exchange the decryption key for a Bitcoin payment. Their exact demands can be found in the file 'HOW_FIX_FILES.html' that the Cat4er Ransomware delivers after completing its attack. You can also recognize the damaged files by the suffix '.Cat4er' extension added to their name.

The criminals ask for 0.08 Bitcoin, which is the equivalent of about $3,000. They do not provide any contact details and, instead, only list their wallet address. However, there is a TOR-based payment page, which may be used to get in touch with the criminals.

We advise you not to consider paying – it would be very easy for the crooks to take your money without giving anything in return. Instead, use an anti-malware tool to clean the infected files. Then, look for alternative data recovery options. Keep in mind that the best way to restore files damaged by ransomware is through a backup.

February 4, 2022
Loading...

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.