Important for Zepto victims!
Files, encrypted by Zepto could not be the only harm done to your computer. Zepto may still be active on your machine and may spread to other computers on your network. To detect if you are still at risk and eliminate the threat, we recommend downloading SpyHunter.
A new variant of the infamous Locky ransomware has been recently unleashed worldwide – its name is Zepto and it uses the same ransom note as that of its predecessor. Moreover, it adds the .zepto extension to the encrypted files.
Zepto Ransomware – How Does It Enter Your PC?
Zepto Ransomware – What Does It Do?
Once Zepto is inside the victim’s system, it will initiate a scanning process to detect files for encryption. Such files are:
Once the encryption process is complete, Zepto will turn the desktop’s image into a ransom note that looks like that:
!!! IMPORTANT INFORMATION !!!
All of your files are encrypted with RSA-2048 and AES-128 ciphers.
More information about the RSA and AES can be found here:
Decrypting of your files is only possible with the private key and decrypt program, All which is on our secret server.
To receive your private key follow one of the links:
If all of this addresses are not available, follow synthesis steps:
1. Download and install Tor Browser: https://www.torproject.org/download/download-easy(.)html
2. After a successful installation, run the browser and wait for initialization.
3. Type in the address bar: mphtadhci5mrdlju(.)onion/D7F6EEB0D8FC508E
4. Follow the instructions on the site.
!!! Your personal identification ID: D7F6EEB0D8FC508E !!!
As the ransom message says, Zepto virus uses RSA-2048 and AES-128 ciphers for file encryption. The amount demanded from the victim is 0.5 bitcoins (or 315 US dollars)
Zepto Ransomware – How to Remove It
If you have been attacked by Zepto virus, you must first remove it from your system. To do that, make sure you use a powerful anti-malware tool that will scan your computer and clean the malicious components from it. Only then you can try to restore some of your files via file recovery tools. It’s no lie that once the files have been scrambled by a ransomware infection from the rank of Zepto, Locky, Cerber, etc., it’s almost impossible to restore any of them. Paying the cyber crooks in an exchange for a decryption key, however, is also not the solution since the virus remains in your system and could strike back any time.