Severity scale:  
  (91/100)

Remove SUKA ransomware (Virus Removal Guide) - Recovery Instructions Included

removal by Ugnius Kiguolis - - | Type: Ransomware

SUKA ransomware – a file-locking parasite that drops FILES ENCRYPTED.txt ransom notes following a successful victim data encryption

SUKA ransomwareSUKA ransomware is the version of the Dharma ransomware family.

SUKA ransomware is a cryptovirus that locks every file on the victim's computer (pics, documents, archives, and so on) except for the system files, and then demands a ransom for a decryption tool that would decrypt the files, allegedly. This file-locking virus derives from the Dharma ransomware family that's been active since 2016.

As soon as .SUKA file virus lands on a computer, it starts the encryption process immediately. All personal user files are renamed during this process, appending a complex three-part extension (see the details in the table below), just like its previous versions like ZINFireee, and others. All cryptoviruses of this family use a military-based AES[1] coding algorithm.

Right after the encryption is completed, two types of ransom notes are created. A pop-up window and text files, named FILES ENCRYPTED.txt, which are dropped in every folder that contained personal data. As with all cryptoviruses from the Dharma family, both of the ransom notes of SUKA ransomware virus are short and uninformative.

name SUKA ransomware, .SUKA file virus
type Ransomware
Family Dharma ransomware
Ransom note A pop-up window and text files, titled FILES ENCRYPTED.txt
Appended file extension A tricky triple extension is appended to all non-system files: 1. appointed user ID; 2. criminal email address in brackets – [kjingx@tuta.io]; 3. .SUKA appendix
Criminal contact details Two emails are provided if the victims decide to contact the cybercriminals: kjingx@tuta.io and kjingx@protonmail.ch
Malware removal SUKA ransomware should be removed with anti-malware software so the virus and all its components are properly deleted
System health check We recommend using the ReimageIntego app right after SUKA ransomware removal, to locate and undo all alterations the cryptovirus might have made to system core settings

Ransom notes from Dharma family ransomware differ very slightly. The text file ransom notes from SUKA ransomware mainly contain only two emails of the cybercriminals – kjingx@tuta.io and kjingx@protonmail.ch. The pop-up message is a bit more instructive (you can see both ransom note messages below this paragraph).

The pop-up window ransom note starts with an explanation that all files are encrypted, but access to them can be restored. Then the same two emails are provided to contact the criminals and find out further instructions. Developers of SUKA ransomware also include the appointed unique user ID.

Afterward, the cybercriminals are intimidating the victims not to rename the encrypted files or try and decode them with any third-party tools as that may lead to permanent data loss. And that's it, creators of the .suka file virus don't disclose the ransom amount or preferred payment method. 

Like the makers of Weui, cybercriminals like to establish some fake trust with their victims and ofter are offering free decryption as a guarantee that they possess the necessary decryption tools. That's not the case with the SUKA ransomware, as no such guarantee is provided.

Victims should never consider paying the ransom and should remove SUKA ransomware immediately after detection or first sight of the ransom notes. Professional anti-malware software like SpyHunter 5Combo Cleaner or Malwarebytes should be used to delete such viruses and prevent computers from cyber attacks in the future.

SUKA ransomware virusSUKA ransomware - a virus that locks files with a lengthy appendix.

After SUKA ransomware removal, a system health check is a must. We recommend using a powerful ReimageIntego system tune-up tool to perform a full system scan and fix any registry or other system settings issues that the virus might have caused while it was on your device.

The message extracted from the ransom pop-up window:

YOUR FILES ARE ENCRYPTED
Don't worry,you can return all your files!
If you want to restore them, follow this link:email kjingx@tuta.io YOUR ID –
If you have not been answered via the link within 12 hours, write to us by e-mail:kjingx@protonmail.ch
Attention!
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

A short message from the creators of SUKA ransomware in the text files (FILES ENCRYPTED.txt):

all your data has been locked us
You want to return?
write email kjingx@tuta.io  or kjingx@protonmail.ch

SUKA file virusSUKA ransomware - a virus that demands cryptocurrency payments.

Some simple steps to greatly improve your cybersecurity level

Since the beginning of computer viruses,[2] they have evolved into a severe threat to everyday computer users. Malware is hidden everywhere throughout the world wide web, just waiting for unaware guests to click on it. But we're here to help, so stick to these simple steps, and you could evade cyberattacks:

  1. Always keep your operating system up-to-date. It doesn't matter if it's Windows or Mac devices. Please install the latest updates as soon as they are available.
  2. Purchase a trustworthy anti-malware app to safeguard your passageways. Perform regular system scans, update its virus database frequently.
  3. Use a system tune-up tool to get rid of any tracking cookies, and scan the system regularly to ensure every setting is as it should be.
  4. Keep backups of your sensitive data on at least two separate devices/locations.
  5. Don't visit high-risk websites, including torrent sites.
  6. Refrain from opening any suspicious emails. Please don't open any hyperlinks in them or download any of their attachments.

Guide for deletion of SUKA ransomware virus from an affected device

Trusting the creators of SUKA file virus and forwarding them money is the worse thing that any victim of a cyber attack can do. This payoff motivates the cybercriminals to increase their attacks and search for more sophisticated techniques to infect everyday computer users' devices.

Remove SUKA ransomware immediately after the first sight of ransom notes. The longer it stays in your computer system, the more damage it could do. We advise removing it with SpyHunter 5Combo Cleaner or Malwarebytes apps. These programs are trustworthy and watch your backs in the future.

When users are done with SUKA ransomware removal, experts[3] recommend performing a full system scan with a system clean up software like the ReimageIntego app to find and fix any modifications the virus might have done to system core files and system settings.

Offer
do it now!
Download
Reimage Happiness
Guarantee
Download
Intego Happiness
Guarantee
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove SUKA virus, follow these steps:

Remove SUKA using Safe Mode with Networking

Removing SUKA ransomware with the help of Safe Mode with Networking

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove SUKA

    Log in to your infected account and start the browser. Download ReimageIntego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete SUKA removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove SUKA using System Restore

Removing .suka file virus using System Restore

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of SUKA. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with ReimageIntego and make sure that SUKA removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove SUKA from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

If your files are encrypted by SUKA, you can use several methods to restore them:

Using third-party app Data Recovery Pro to recover lost files

This app might be able to recover at least some of your lost data.

  • Download Data Recovery Pro;
  • Follow the steps of Data Recovery Setup and install the program on your computer;
  • Launch it and scan your computer for files encrypted by SUKA ransomware;
  • Restore them.

Using Windows Previous Version to retrieve files

With this feature, users might be able to recover files to their previous versions:

  • Find an encrypted file you need to restore and right-click on it;
  • Select “Properties” and go to “Previous versions” tab;
  • Here, check each of available copies of the file in “Folder versions”. You should select the version you want to recover and click “Restore”.

Shadow Explorer – a powerful app for data recovery

If Shadow Volume Copies weren't erased by the SUKA ransomware, then Shadow Explorer might be helpful with the file recovery:

  • Download Shadow Explorer (http://shadowexplorer.com/);
  • Follow a Shadow Explorer Setup Wizard and install this application on your computer;
  • Launch the program and go through the drop down menu on the top left corner to select the disk of your encrypted data. Check what folders are there;
  • Right-click on the folder you want to restore and select “Export”. You can also select where you want it to be stored.

No descriptions tools are currently available

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from SUKA and other ransomwares, use a reputable anti-spyware, such as ReimageIntego, SpyHunter 5Combo Cleaner or Malwarebytes

Choose a proper web browser and improve your safety with a VPN tool

Online spying has got momentum in recent years and people are getting more and more interested in how to protect their privacy online. One of the basic means to add a layer of security – choose the most private and secure web browser. Although web browsers can't grant full privacy protection and security, some of them are much better at sandboxing, HTTPS upgrading, active content blocking, tracking blocking, phishing protection, and similar privacy-oriented features. However, if you want true anonymity, we suggest you employ a powerful Private Internet Access VPN – it can encrypt all the traffic that comes and goes out of your computer, preventing tracking completely.

 

Lost your files? Use data recovery software

While some files located on any computer are replaceable or useless, others can be extremely valuable. Family photos, work documents, school projects – these are types of files that we don't want to lose. Unfortunately, there are many ways how unexpected data loss can occur: power cuts, Blue Screen of Death errors, hardware failures, crypto-malware attack, or even accidental deletion.

To ensure that all the files remain intact, you should prepare regular data backups. You can choose cloud-based or physical copies you could restore from later in case of a disaster. If your backups were lost as well or you never bothered to prepare any, Data Recovery Pro can be your only hope to retrieve your invaluable files.

About the author
Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions

References

Your opinion regarding SUKA ransomware