Call 24/7: +1 (800) 972-3282

NanoLocker Ransomware Data Recovery

Bogdan Glushko

Bogdan Glushko

CEO at SalvageData Recovery, Bogdan Glushko has over 18 years of experience in high-security data recovery. Over the years, he's been able to help restore data after logical errors, physical failures, or even ransomware attacks, for individuals, businesses, and government agencies alike.

Socials:

Bogdan Glushko

Bogdan Glushko

CEO at SalvageData Recovery, Bogdan Glushko has over 18 years of experience in high-security data recovery. Over the years, he's been able to help restore data after logical errors, physical failures, or even ransomware attacks, for individuals, businesses, and government agencies alike.

Socials:

I think there's an issue with my storage device, but I'm not sure Start a free evaluation →

I need help getting my data back right now Call now (800) 972-3282

What is NanoLocker Ransomware?

NanoLocker is a ransomware that was first seen in the wild in early 2019. It is believed to be a variant of the Locky ransomware. NanoLocker uses the AES-256 encryption algorithm to encrypt files on the infected computer, it is the same encryption algorithm that Locky uses. NanoLocker is written in the Go programming language.

Once NanoLocker has encrypted a file, it will append the “.nano” extension to the encrypted file. For example, a file named “sample.jpg” would be renamed “sample.jpg.nano”.

 

NanoLocker will also create a text file named “!ReadMe!.txt” in each folder that contains encrypted files. This text file contains NanoLocker’s ransom demand. NanoLocker demands a ransom of 0.5 Bitcoin, which is currently worth approximately $3,500 USD. NanoLocker does not appear to be targeted at any specific geographical region or type of user.

How does NanoLocker get on my computer?

Someone typically spread NanoLocker through spam emails that contain a malicious attachment. These attachments are usually Microsoft Word documents that have been infected with macro malware. When the macro is enabled, the NanoLocker ransomware will be downloaded and installed on the computer.

 

NanoLocker may also be spread through fake software updates, such as Adobe Flash Player updates, and through peer-to-peer (P2P) file-sharing networks.

What types of files does NanoLocker encrypt?

It will encrypt most types of files on your computer, including documents, images, videos, and music files. NanoLocker will also encrypt some types of system files. However, NanoLocker will not encrypt files that are in the Windows “Startup” folder.

What was the biggest NanoLocker outbreak?

The biggest NanoLocker outbreak occurred in March 2019. This outbreak affected over 100,000 computers in 150 countries.

Prevention

There are several steps you can take to prevent NanoLocker:

  •  Keep your operating system and software up-to-date. Outdated software often contains security vulnerabilities that malware can exploit.
  •  Do not open email attachments from unknown senders. If you receive an email attachment from someone you don’t know, delete it immediately.
  •  Do not download pirated software. Pirated software is often infected with malware.
  •  Use a reliable anti-malware program. NanoLocker may be able to bypass some less sophisticated anti-malware programs. However, a reputable anti-malware program will detect and remove NanoLocker before it can encrypt your files.
  •  Back up your files. NanoLocker will encrypt your files, making them inaccessible. However, if you have a backup of your files, you will be able to recover them after NanoLocker has been removed from your computer.

What should you do?

If NanoLocker is on your computer, you should take the following steps:

  • Do not pay the ransom.

There is no guarantee that paying the ransom will decrypt your files. In some cases, victims who have paid the ransom have not had their files decrypted.

  • Do not try to remove NanoLocker yourself.

NanoLocker is a complex piece of malware, and attempting to remove it without the assistance of an IT professional could make matters worse.

  • Do not waste your time and money trying to find a decryption tool.

There is no public decryption tool for NanoLocker. Even if you find a decryption tool online, it is likely that it is fake or will not work correctly.

  • Contact a data recovery service.

NanoLocker uses a very strong encryption algorithm, making it extremely difficult to decrypt files without the encryption key. However, there are data recovery services that specialize in decrypting files encrypted by ransomware. These services may be able to decrypt your NanoLocker-encrypted files.

SalvageData Recovery Services is one such service. We have a success rate of over 96% in decrypting files encrypted by NanoLocker.

If you would like to learn more about our data recovery services, please visit our website or contact us at +1 (800) 972-3282. We are happy to help you 24/7/365.

Thank you for choosing SalvageData!

 

Share

Related Services

Ransomware Recovery

Read more

Emergency Data Recovery Services

Read more

Hard Drive Recovery

Read more