CMLOCKER Ransomware Asks for $1k in Ransom

CMLOCKER is yet another newly discovered ransomware variant. This strain does not belong to any large ransomware family.

CMLOCKER does nothing out of the ordinary when it comes to ransomware. The malware will encrypt media files, documents, archives and executables on the target system.

Once encrypted, files receive a new ".CMLOCKER" extension following their original one. This will turn a file called "email.txt" into "email.txt.CMLOCKER" upon encryption.

The ransom note is deposited inside a file named "HELP_DECRYPT_YOUR_FILES.txt" and goes as follows:

Oops All Of your important files were encrypted Like document pictures videos etc..

Don't worry, you can return all your files!

All your files, documents, photos, databases and other important files are encrypted by a strong encryption.

How to recover files?

RSA is a asymmetric cryptographic algorithm, you need one key for encryption and one key for decryption so you need private key to recover your files. It’s not possible to recover your files without private key.

The only method of recovering files is to purchase an unique private key.Only we can give you this key and only we can recover your files.

What guarantees you have?

As evidence, you can send us 1 file to decrypt by email We will send you a recovery file Prove that we can decrypt your file

Please You must follow these steps carefully to decrypt your files:

Send $980 worth of bitcoin to wallet: [alphanumeric string]

after payment,we will send you Decryptor software

contact email: leljicok at gmail dot com

Your personal ID:

October 19, 2022
Loading...

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.