Severity scale:  
  (99/100)

Remove R980 ransomware / virus (Free Guide)

removal by Olivia Morelli - - | Type: Ransomware

R980 ransomware – what is it for and how does it work?

R980 virus is a specific malware variant, which uses an asymmetric encryption algorithm to render victim’s files useless. This computer threat scans the entire computer system, goes through every single folder except system folders and corrupts all data that it is programmed to find. Victims who have their computers affected by this virus report that it encrypts videos, music, documents, presentations, images, and other file types, and scrambles their filenames, renaming them with a random set of characters. However, there were some reports stating that this virus did not encrypt the data, which means that this malicious piece of software has been created with several bugs and might still be under development at the moment. After a successful infection, this virus creates a ransom note and saves it as a .txt file on the computer desktop, and also changes desktop wallpaper with an image that includes the same information that the ransom note provides.

The letter from authors of this ransomware is a traditional ransom note. It contains information about the infection, what encryption algorithms were used (in this case – both AES-256 and RSA-4096), how to recover the files and what is the price of the ransom. R980 malware warns the user that an antivirus program can not retrieve the data, which, unfortunately, is true. However, a strong anti-malware application can prevent this virus from encrypting your files, so it is highly advisable to install one on the computer system. This virus demands half of a Bitcoin for the decryption key, which is approximately 328 USD. The ransom has to be sent to a provided Bitcoin address, and this payment method is used in order to protect cybercriminals from being detected. Then the victim has to wait up to 24 hours until R980 decrypter arrives.

R980 malware leaves this ransom note on the compromised computer's screen

Questions about R980 ransomware virus

If you have become a victim of R980 ransomware, we heartily recommend you not to pay the ransom. That is the only way to stop cyber criminals who create these viruses every single day. The list of ransomware examples includes Locky, CryptoWall, CryptXXX, Petya, and hundreds of similar viruses. It hurts to lose your precious files, but sometimes malware researchers succeed to defeat these viruses and come up with free decryption tools. Meanwhile, it is recommended to remove R980 virus with a help of a malware-removal tool. You can use Reimage Reimage Cleaner Intego for that.

How did this virus enter my computer system?

Typically, ransomware distribution methods don’t change. Crooks tend to distribute them via malvertising, drive-by downloads, and mostly malicious email campaigns. These threats are often concealed as safe-looking files and sent directly to victims via email, or added to bogus software updates and advertised via shady Internet sites. It is important to understand that criminals do everything to deceive computer users, so it is important to stay cautious at all times and always think before clicking on a flashy ad or a “download” button, as this can lead to sad consequences. We advise you to download software or updates ONLY from verified and secure Internet sites, never open emails that are sent by unknown individuals, and install a reliable anti-malware software to keep your computer protected. You should also keep all your programs up-to-date to prevent frauds from exploiting security vulnerabilities in them.

How to remove R980 ransomware?

R980 virus is a hard-to-defeat computer program, so we greatly advise you to allow an advanced virus removal program to scan your computer system and automatically detect malignant components of it. It is not a regular computer program, and its developers have done everything to make it harder to remove. This threat might also try to stop you from running your malware removal program, so in such case, follow instructions that are given below:

Offer
do it now!
Download
Reimage Happiness
Guarantee
Download
Intego Happiness
Guarantee
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove R980 virus, follow these steps:

Remove R980 using Safe Mode with Networking

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove R980

    Log in to your infected account and start the browser. Download Reimage Reimage Cleaner Intego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete R980 removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove R980 using System Restore

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of R980. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with Reimage Reimage Cleaner Intego and make sure that R980 removal is performed successfully.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from R980 and other ransomwares, use a reputable anti-spyware, such as Reimage Reimage Cleaner Intego, SpyHunter 5Combo Cleaner or Malwarebytes

Do not let government spy on you

The government has many issues in regards to tracking users' data and spying on citizens, so you should take this into consideration and learn more about shady information gathering practices. Avoid any unwanted government tracking or spying by going totally anonymous on the internet. 

You can choose a different location when you go online and access any material you want without particular content restrictions. You can easily enjoy internet connection without any risks of being hacked by using Private Internet Access VPN.

Control the information that can be accessed by government any other unwanted party and surf online without being spied on. Even if you are not involved in illegal activities or trust your selection of services, platforms, be suspicious for your own security and take precautionary measures by using the VPN service.

Backup files for the later use, in case of the malware attack

Computer users can suffer various losses due to cyber infections or their own faulty doings. Software issues created by malware or direct data loss due to encryption can lead to problems with your device or permanent damage. When you have proper up-to-date backups, you can easily recover after such an incident and get back to work.

It is crucial to create updates to your backups after any changes on the device, so you can get back to the point you were working on when malware changes anything or issues with the device causes data or performance corruption. Rely on such behavior and make file backup your daily or weekly habit.

When you have the previous version of every important document or project you can avoid frustration and breakdowns. It comes in handy when malware occurs out of nowhere. Use Data Recovery Pro for the system restoring purpose.

About the author

Olivia Morelli
Olivia Morelli - Ransomware analyst

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Olivia Morelli
About the company Esolutions


  1. Sense says:
    July 28th, 2016 at 7:56 am

    Where is the decryption tool? where can I find it??

  2. Lorra says:
    July 28th, 2016 at 7:56 am

    Cant delete this virus manually.. somebody help!

  3. Smith28 says:
    July 28th, 2016 at 7:57 am

    why would you even try to do that?! its a freaking ransomware, not a fun program, you know. This crapware is damn dangerous!

  4. Saint0 says:
    July 28th, 2016 at 7:58 am

    Deleted the virus, now just gotta sort out the decryption thing…

Your opinion regarding R980 ransomware virus