Tag Archives: Eliminate UpdateHost Ransomware

Easy Removal Steps of UpdateHost Ransomware from PC

UpdateHost Ransomware is an awful crypto-malware threat that uses a sophisticated AES algorithm lock files in users computer using a public key while to get the files unlocked a private key is needed. Like any other malware it is designed to take users file as hostage and to extort money from innocent computer users. As soon as it enters the computer, it scans for files stored in the local drives and then encrypts them and appends ‘.locked’ as an extension to the encrypted files. And then deletes the Volume Shadow copies of the files so as to make the decryption impossible without contacting the hackers. Ransom note left by UpdateHost Ransomware on the desktop namely ‘README.txt’ which says that the files in users computer have been encrypted and can be unlocked with a decryption key for they have to an amount. But there is a peculiarity, this note does not disclose the amount to be paid and also neither the mode of payment. Only an email address ‘ghanihate@gmail.com’ is given in the note asking to contact for further instructions.

UpdateHost Ransomware

Victims of UpdateHost Ransomware should not take haphazard step in order to get the decryption key. Because paying of the amount doesn’t ensures that the victim will get the decryption key as the hackers may ignore the victims after they get the amount. Moreover, it will encourage the criminals to again carry out such extortion. UpdateHost Ransomware is one of the many versions of Hidden Tear open-source Project. The main motive behind creating this project was educational, intending to teach users how this ransomware works and how to avoid getting infected by it, but it went in the wrong hands and got used for extortion. It enters the computer mainly through spam email attachments, updating of applications from fraudulent sites and also via software sharing platforms and so on.

If your computer is infected by UpdateHost Ransomware then without any delay take necessary steps to remove it from the computer.

Continue reading