Jhon Woddy virus Removal Guide
What is Jhon Woddy ransomware virus?
Jhon Woddy virus takes over your files and holds them ransom
Jhon Woddy virus operates as a file-encrypting malware that stems from the M4N1F3STO ransomware family. As common for this type of cyber infection, it enters into the device without users' consent and encrypts all pictures, music, video, documents, and other files located on all Windows drives using a sophisticated encryption method known as AES appending .killedXXX extensions in the process.
As soon as that is done, users will find that they cannot use their computers due to the lock screen. Instead, they will be presented with a ransom note that would cover the full desktop, and none of the other Windows features would be operational. Dot nor make any rational decisions, and do not panic, as we will provide you best options on how to deal with the virus and restore your files for free.
|Type||Ransomware, file-locking virus, screen-locker|
|File extension||.killedXXX, appended to each of the personal files on the PC|
|Malware removal||Use powerful anti-malware software, such as SpyHunter 5Combo Cleaner|
|System fix||Use FortectIntego to fix virus damage automatically|
The media indirectly invites hackers to get on the track again with new ransomware, and some crooks already respond to such invitations. There have been several ransomware viruses with odd titles appearing in the online market. Among them are MerryXmas, Jew Crypt virus, and CryptoShadow malware. The majority of them rarely cause big troubles for the virtual community, but some of them present quite a riddle for the bright minds of IT cyber security.
However, after a brief analysis, it looks like the virus does not seem to possess intricate components. Even though it has become a trend among hackers, the malware does not target mobile owners yet . s. Some cybercriminals take up the infamous Locky‘s manner to target medical institutions .
At the moment, there have been no reports yet on whether the malware will evolve to a bigger cyber campaign. Fortunately, a low number of Jhon Woddy infections were detected. Usually, the crooks take inspiration from pop culture, film industry, or mythology to give the names to their creations .
Many might speculate whether there is a hidden message behind this ransomware strain. Though it reminds me of the name of an English actor named John Woody, the similarity might be just purely coincidental. Speaking of the capabilities of this threat, it encodes the files on a desktop and local disk.
Do not pay the ransom as it does not guarantee that the files will be returned . Instead, we recommend you check the solutions below – you are likely to recover all the .killedXXX files for free.
Eliminating Jhon Woddy
The best way to remove the Jhon Woddy virus is to shift to automatic elimination. Install an anti-spyware application, SpyHunter 5Combo Cleaner or Malwarebytes, and let it perform the scan. Do not forget to update it before the scan. However, this might be difficult to do, as malware also might lock your screen.
Luckily, security researchers who analyzed malware found the built-in key that could be used to gain access to your desktop. Thus, simply enter the following code and press Enter:
If that does not work, however, you might have to access Safe Mode with networking in order to delete all malware components. To do that, follow these steps:
Windows 7 / Vista / XP
- Click Start > Shutdown > Restart > OK.
- When your computer becomes active, start pressing F8 button (if that does not work, try F2, F12, Del, etc. – it all depends on your motherboard model) multiple times until you see the Advanced Boot Options window.
- Select Safe Mode with Networking from the list.
Windows 10 / Windows 8
- Right-click on Start button and select Settings.
- Scroll down to pick Update & Security.
- On the left side of the window, pick Recovery.
- Now scroll down to find Advanced Startup section.
- Click Restart now.
- Select Troubleshoot.
- Go to Advanced options.
- Select Startup Settings.
- Click Restart.
- Press 5 or click 5) Enable Safe Mode with Networking.
Lastly, you should not forget to update your system applications and eliminate possible vulnerabilities.
File recovery without paying criminals
Many ransomware viruses are dangerous not because they infect the computer but because of what they do after – encrypt all the data. This, unfortunately, can not be reversed after Jhon Woddy ransomware removal is performed – this is also true for any other ransomware infection.
Luckily, a working decryptor by security researcher Michael Gillespie is available for free [download link]. Please download the tool and restore your data for free. Also, we have an alternative method for you, so there is no need to pay cybercriminals – you can try using recovery software:
- Download Data Recovery Pro.
- Double-click the installer to launch it.
- Follow on-screen instructions to install the software.
- As soon as you press Finish, you can use the app.
- Select Everything or pick individual folders where you want the files to be recovered from.
- Press Next.
- At the bottom, enable Deep scan and pick which Disks you want to be scanned.
- Press Scan and wait till it is complete.
- You can now pick which folders/files to recover – don't forget you also have the option to search by the file name!
- Press Recover to retrieve your files.
Ways ransomware attack computers
This sort of malware usually paves its way into users‘ computers via spam emails. Gearheads have developed ways to persuade users with counterfeited invoices, tax refunds, and messages. Often crooks alert users to review the attachment quickly by making up a fake story about severe possible outcomes for the delay. It is a usual psychological pressure not to leave enough time for the victims to look for alternative solutions.
The infection of malware might have taken place as the result of visiting a corrupted website. Usually, it happens to be a torrent-sharing web page. Some ransomware threats disguise in trojans. Likewise, it is necessary to install an anti-spyware application to lower the risk of a probable hijack.
Fix malware damage automatically
Once a computer is infected with malware, its system is changed to operate differently. For example, an infection can alter the Windows registry database, damage vital bootup and other sections, delete or corrupt DLL files, etc.
The technology used by the program is patented unique, and one-of-a-kind. It can fix virus damage after infection and malware that has already broken into a system via several engines onboard this application. The software also features the ability to fix various Windows-related issues such as Blue Screen errors, freezes, or registry errors which are not caused due to any malware infections but could be from other causes like damaged DLLs, etc.
- Download Reimage
- Click on the ReimageRepair.exe
- If User Account Control (UAC) shows up, select Yes
- Press Install and wait till the program finishes the installation process
- The analysis of your machine will begin immediately
- Once complete, check the results – they will be listed in the Summary
- You can now click on each of the issues and fix them manually
- If you see many problems that you find difficult to fix, we recommend you purchase the license and fix them automatically.
Getting rid of Jhon Woddy virus. Follow these steps
Create data backups to avoid file loss in the future
One of the many countermeasures for home users against ransomware is data backups. Even if your Windows get corrupted, you can reinstall everything from scratch and retrieve files from backups with minimal losses overall. Most importantly, you would not have to pay cybercriminals and risk your money as well.
Therefore, if you have already dealt with a ransomware attack, we strongly advise you to prepare backups for future use. There are two options available to you:
- Backup on a physical external drive, such as a USB flash drive or external HDD.
- Use cloud storage services.
The first method is not that convenient, however, as backups need to constantly be updated manually – although it is very reliable. Therefore, we highly advise choosing cloud storage instead – it is easy to set up and efficient to sustain. The problem with it is that storage space is limited unless you want to pay for the subscription.
Using Microsoft OneDrive
OneDrive is a built-in tool that comes with every modern Windows version. By default, you get 5 GB of storage that you can use for free. You can increase that storage space, but for a price. Here's how to setup backups for OneDrive:
- Click on the OneDrive icon within your system tray.
- Select Help & Settings > Settings.
- If you don't see your email under the Account tab, you should click Add an account and proceed with the on-screen instructions to set yourself up.
- Once done, move to the Backup tab and click Manage backup.
- Select Desktop, Documents, and Pictures, or a combination of whichever folders you want to backup.
- Press Start backup.
After this, all the files that are imported into the above-mentioned folders will be automatically backed for you. If you want to add other folders or files, you have to do that manually. For that, open File Explorer by pressing Win + E on your keyboard, and then click on the OneDrive icon. You should drag and drop folders you want to backup (or you can use Copy/Paste as well).
Using Google Drive
Google Drive is another great solution for free backups. The good news is that you get as much as 15GB for free by choosing this storage. There are also paid versions available, with significantly more storage to choose from.
You can access Google Drive via the web browser or use a desktop app you can download on the official website. If you want your files to be synced automatically, you will have to download the app, however.
- Download the Google Drive app installer and click on it.
- Wait a few seconds for it to be installed.
- Now click the arrow within your system tray – you should see Google Drive icon there, click it once.
- Click Get Started.
- Enter all the required information – your email/phone, and password.
- Now pick what you want to sync and backup. You can click on Choose Folder to add additional folders to the list.
- Once done, pick Next.
- Now you can select to sync items to be visible on your computer.
- Finally, press Start and wait till the sync is complete. Your files are now being backed up.
Report the incident to your local authorities
Ransomware is a huge business that is highly illegal, and authorities are very involved in catching malware operators. To have increased chances of identifying the culprits, the agencies need information. Therefore, by reporting the crime, you could help with stopping the cybercriminal activities and catching the threat actors. Make sure you include all the possible details, including how did you notice the attack, when it happened, etc. Additionally, providing documents such as ransom notes, examples of encrypted files, or malware executables would also be beneficial.
Law enforcement agencies typically deal with online fraud and cybercrime, although it depends on where you live. Here is the list of local authority groups that handle incidents like ransomware attacks, sorted by country:
- USA – Internet Crime Complaint Center IC3
- United Kingdom – ActionFraud
- Canada – Canadian Anti-Fraud Centre
- Australia – ScamWatch
- New Zealand – ConsumerProtection
- Germany – Polizei
- France – Ministère de l'Intérieur
If your country is not listed above, you should contact the local police department or communications center.
Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Jhon Woddy and other ransomwares, use a reputable anti-spyware, such as FortectIntego, SpyHunter 5Combo Cleaner or Malwarebytes
How to prevent from getting ransomware
Stream videos without limitations, no matter where you are
There are multiple parties that could find out almost anything about you by checking your online activity. While this is highly unlikely, advertisers and tech companies are constantly tracking you online. The first step to privacy should be a secure browser that focuses on tracker reduction to a minimum.
Even if you employ a secure browser, you will not be able to access websites that are restricted due to local government laws or other reasons. In other words, you may not be able to stream Disney+ or US-based Netflix in some countries. To bypass these restrictions, you can employ a powerful Private Internet Access VPN, which provides dedicated servers for torrenting and streaming, not slowing you down in the process.
Data backups are important – recover your lost files
Ransomware is one of the biggest threats to personal data. Once it is executed on a machine, it launches a sophisticated encryption algorithm that locks all your files, although it does not destroy them. The most common misconception is that anti-malware software can return files to their previous states. This is not true, however, and data remains locked after the malicious payload is deleted.
While regular data backups are the only secure method to recover your files after a ransomware attack, tools such as Data Recovery Pro can also be effective and restore at least some of your lost data.