How to Remove the Lookfornewitguy Ransomware
Ransomware is a type of malicious software that restricts access to the computer system that it infects, and demands a ransom paid to the creator in order to remove the restriction. It is typically spread via email attachments, drive-by downloads, and websites. Typically ransomware will encrypt files on infected machines and then demand payment in exchange for the keys needed to decrypt the files.
One of the recently identified ransomware samples is called the Lookfornewitguy Ransomware, and it shares features with the Phobos Ransomware. Unfortunately, neither of these threats' encryption can be cracked, and their victims may be stuck in an unfortunate situation. Lookfornewitguy Ransomware's attack can be recognized by the unique suffix it applies to names of files it locks – '.id[<VICTIM ID>].[ICQ_Lookfornewitguy].Lookfornewitguy.' Using ICQ to communicate with their victims is rather unconventional for cybercriminals, and the Lookfornewitguy Ransomware's creators are one of the few groups that rely on this type of communication.
Lookfornewitguy Ransomware also drops a ransom note called 'info.hta.' It instructs the victim to download and use ICQ to contact the perpetrators. It also tells them that they can submit one file under 4MB to be decrypted for free, so that the attackers can prove their ability to restore the victim's data. Even if they deliver on their promise, you should not agree to send them any money, because they may try extorting you for another payment, or they may even end up blocking you on ICQ.
The best way to protect against malware is to keep everything updated. Make sure you have the latest versions of your operating system and the latest versions of your programs, whether we’re talking about your web browser, your email client, or your operating system. Any time there’s a security update, make sure you install it right away. If the Lookfornewitguy Ransomware has penetrated your system's defenses, run an anti-malware tool remove its malicious files immediately. After this, explore the best data recovery options online.