How to remove PewCrypt Ransomware (Virus Removal Guide)
PewCrypt ransomware, also referred to as PewDiePie ransomware, is malware that encrypts the files on your computer with AES encryption, makes you subscribe to PewDiePie on YouTube, and then makes you wait for PewDiePie to reach 100 million YouTube subscribers for a decryption tool will be released. However, if the YouTube channel T-Series gets 100 million YouTube subscribers before PewDiePie the private key and your files will be deleted.
When PewCrypt ransomware infects a computer it will encrypt files and change the file extension to PewCrypt. This means that a file named test.jpg will become test.jpg.PewCrypt. The ransomware will also show a ransom note.
Your Files Have Been Encrypted!
Pewdiepie Sub Count:
T-Series Sub Count:
Your files have been encrypted using a 256 AES key which has been encrypted with a 2048 bit RSA key
In order to get your files back read the instructions below
Instructions:
– Subscribe to Pewdiepie (Hint: Hit the bro fist)
– Wait until Pewdiepie reaches 100 million subs at which point a decryption tool will be released
If T-Series beats Pewdiepie THE PRIVATE KEY WILL BE DELETED AND YOU FILES GONE FOREVER!
Although the computer virus is not associated with YouTuber PewDiePie, the purpose of PewCrypt ransomware is clearly to help PewDiePie reach 100 million YouTube subscribers before T-Series.
Ransomware such PewCrypt is typically distributed by spam email message campaigns and websites that host malware or display malicious advertisements.
Step 1: Scan your computer with Malwarebytes
1. Download Malwarebytes Anti-Malware software to scan your computer and remove malicious files and potentially unwanted programs.
2. To install the program, locate and double-click the executable file you just downloaded. The file can usually be found in the Download folder.
3. Choose if this is for home or work use and click Agree and Install to begin installing Malwarebytes. Once the installation is complete, click Finish.
4. Once Malwarebytes is installed, open the program and click the Scan Now button on the dashboard – or go to the Scan tab and click the Start Scan button.
5. When the scan is complete click the Quarantine Selected button.
6. If Malwarebytes says “All selected items have been removed successfully. A log file has been saved to the logs folder. Your computer needs to be restarted to complete the removal process. Would you like to restart now?” click the Yes button to restart your computer.
Step 2: Scan your computer with HitmanPro
1. Download HitmanPro to perform a second-opinion scan and remove any remaining malicious trace files. A second-opinion scan is important when removing malware and malicious files from your computer.
2. To install the program, locate and double-click the executable file you just downloaded. The file can usually be found in the Download folder.
3. Once HitmanPro is installed, open the program and click Next to start scanning your computer. *If you are using the free version you may choose to create a copy or perform a one-time scan.
4. When the HitmanPro scan is complete, click the Next button.
5. To activate the free version of HitmanPro: enter your email address twice and click the Activate button.
6. Click the Reboot button.
Step 3: Secure your computer
Consider these best practices to ensure that your computer is secure from cyber threats like this in the future.
Use Antivirus with real-time protection
Using an Antivirus program with real-time protection can stop emerging threats and hackers from gaining access to your computer or mobile device. Antivirus programs can remove malicious files that are already on your computer, prevent your programs from being used against you, protect you from malicious websites, and stop known and unknown ransomware attacks.
Recommendations:
- Malwarebytes (Malwarebytes is an Antimalware program that can be used alongside Antivirus programs)
- Norton Security Deluxe
- AVG Internet Security Unlimited
Use a VPN
Using a VPN creates a private tunnel to keep the eyes of eavesdroppers and hackers away from your private data while you browse the web. With a VPN, you become anonymous and no one can determine who you are. Your data is encrypted and your web activity cannot be tracked.
Recommendations: