Remove Temlown Ransomware
Victims of the Temlown Ransomware may be in a lot of trouble, because it will not be easy to get their fiels back. If you fall victim to this attack, you will be unable to use a majority of your documents, media, archives, projects, and other files. This is because their contents were securely encrypted by the Temlown Ransomware. This change is not reversible via free tools.
This threat belongs to the VoidCrypt Ransomware family and, unfortunately, this is bad news. This family has given birth to a long list of file-lockers, and the Temlown Ransomware is just the latest entry to the list. None of VoidCrypt's variants are decryptable, and victims often need to seek alternative, unreliable data recovery options. Currently, the only good way to restore files that this threat locks is to use a backup.
Temlown Ransomware Leaves Its Victims with Few Recovery Options
The Temlown Ransomware makes some very notable changes to the victim's device. The files it locks will have a new suffix at the end of their name - .[noitanimodd@gmail.com][<VICTIM ID>].temlown. Victims will also discover the ransom note 'Read-this.txt' on their desktop. This file advises them to not try 3rd-party decryptors because, allegedly, this could damage their files more. Instead, it tells them to contact the attackers via noitanimodd@gmail.com or temloown@tuta.io.
You can be sure that this threat's creators want to receive a ransom fee in exchange for their services. Typically, ransomware attackers request thousands of dollars from their victims, and they demand to be paid through Bitcoin. It is not a good idea to try and co-operate with the criminals behind the Temlown Ransomware. They may take your money and scam you. The best way to proceed is to run a malware removal tool, and ensure the full termination of the file-encryption Trojan. Once you do this, you can try restoring files from a backup if you have one available. Alternatively, there are data recovery software suites that may be able to partially restore your data.