What is FessLeak:
Threat Classification: Ransomware
FessLeak is the newest version of Crypto ransomware infections. Similar to Cryptorwall, HowDecrypt and CryptoLocker. FessLeak will target computers running Windows operating systems. It was released in October 2014 and uses corrupted ad-bidding networks to spread itself. It is considered, that FessLeak was developed in Russia. The infection uses a recently discovered vulnerability in the Adobe Flash Player (APSA15-02 / CVE-2015-0313). FessLeak is delivered to the victim’s computer, by exploiting the Flash Player vulnerability. Security researchers have found that the ransomware uses a file called “makes calls to icacls.exe“, that changes permissions on files and folders, but so far no binary has been detected. It is considered that the FessLeak is mutating to avoid detection by the antivirus products. Unfortunately, FessLeak uses 2048-bit strong RSA encryption, which means that there is no chance of decrypting the files encrypted by FessLeak.
FessLeak will fully encrypt your data compared with some of its predecessors. When activated, FessLeak encrypts certain types of files stored on your local and mounted network drives using RSA-3072 bit public-key cryptography (even stronger then its predecessors), with the private key stored only on the malware’s command & control servers. FessLeak would encrypt .doc, .xls, and .bmp, .txt, images and videos
Once the infection is executed on your computer, it will inject itself deep into the system by modifying the registry in order to start with Windows on every boot. Then it will start encrypting files. This is a newborn virus and is very hard to detect. However, the infection will manifest itself after the encryption process has been completed and will ask for a ransom. The payment should be made through Bitcoins – untraceable payment method.
FessLeak will not only encrypt your files and lock your computer. It will also collect information that might be used to compromise you. The ransomware may steal other relevant information as your personal details, and send it over to the creators. That is the reason why this malware infection should not be left unattended, and it needs to be terminated immediately, as it is a serious threat to your online security.
*Please note that, unfortunately, as of now there is no method of decrypting the files encrypted by FessLeak. The infection will also delete all your Shadow Volume Copies. The only way to restore your files is by using a backup copy.
There are two ways to remove this infection. It is totally up to you to decide which way you want to go:
1. Automatic Removal Method (recommended for regular or novice users) using a Professional Malware Removal Software.
2. Manual Removal (recommended for PC Experts or Enthusiasts).
Automatic FessLeak Removal:
We recommend using SpyHunter Malware Security Suite.
You can download and install SpyHunter to detect FessLeak and remove it, by clicking the button below. Once installed, SpyHunter will automatically scan and detect all threats present on your system, but in order to use it as a removal tool, you need to purchase a subscription.
SpyHunter will automatically scan and detect all threats present on your system.
Learn more about SpyHunter (EULA). You can find Install Instructions here: (LINK) SpyHunter`s free diagnosis offers free scans and detection. You can remove the detected files, processes and registry entries manually, by yourself, or to purchase the full version to perform an automatic removal and also to receive free professional help with any malware related queries by their technical support department.
*Bear in mind that the removal of the threat will NOT decrypt your files. As of now there is no method of decrypting the files encrypted by FessLeak.
Manual FessLeak Removal:
!!! Please note: You can remove FessLeak manually. However, you should proceed at your own risk. Any of these interventions might render your system inoperable. Therefore this manual removal method is highly recommended for PC Experts or Enthusiasts. For regular users, MalwareKillers.com recommends using SpyHunter or any other reputable security application.
1. Remove FessLeak by restoring your system to a previous state.
1. Reboot your computer into Safe Mode with Command Prompt. To do this, turn your computer off and then back on and immediately when you see anything on the screen, start tapping the F8 key on your keyboard.
***For Windows 8:
If you are using Windows 8, you need to hold the Shift button and tap the F8 key repeatedly, this should boot you into the new advanced “recovery mode”, where you can choose the advanced repair options to show up. On the next screen, you will need to click on the Troubleshoot option, then select Advanced Options and select Windows Startup Settings. Click on the Restart button, and you should now be able to see the Advanced Boot Options screen.
2. Using the arrow keys on your keyboard, select the option “Safe Mode with Command Prompt” and press Enter on your keyboard.
3. When the command prompt loads up, type:
Windows XP: C:\windows\system32\restore\rstrui.exe and press Enter
Windows Vista/7/8: C:\windows\system32\rstrui.exe and press Enter
4. System Restore should initialize, and you will be displayed a list of restore points. Try using a restore point created just before the date and time before the Your-computer-has-been-locked virus has infected your computer.
When System Restore has completed its task, start your computer in Windows normal mode, you would need to perform a scan with anti-spyware software as the infection might still be on the system.
*Please note that your files may remain encrypted, depending on whether your system restore has been set to recover system settings only or system settings and previous version of files.