CCZA Ransomware has joined the constantly growing STOP/Djvu Ransomware family. Like other related variants, it infects computers and locks users’ files, including documents, music, pictures, video files, and others.
Once the encryption is complete, the hackers demand a ransom for a decryptor that would supposedly help you regain access to your data. If your computer has been infected with CCZA Ransomware, as a general rule, it is advised to immediately disconnect any other devices from the compromised computer to prevent further spread of the ransomware.
CCZA Ransomware employs the AES-256 encryption algorithm and appends files with the telltale ‘.CCZA’ extension. Users will then find a ransom note on the computer’s desktop titled “_readme.txt.” This note instructs users to contact the hackers via support@bestyourmail.ch or datarestorehelp@airmail.cc. It also offers to decrypt one file for free to prove that hackers can decrypt the files. They make this offer to entice victims into paying the ransom for full file decryption.
Unfortunately, a free online decryption tool that could restore the files encrypted by CCZA Ransomware is not available at the moment. The only reliable way to recover affected files is to restore them from a backup. You can also try using alternative data recovery options, but there’s no guarantee that alternative data recovery tools can unlock all the encrypted files.
As far as the ransom payment goes, the ransom note instructs victims to pay $980 or $490 in Bitcoin. The lower ransom price depends on whether or not the contact is made within the first 72 hours after the attack.
How Can I Fight CCZA Ransomware?
The most practical way to deal with the CCZA Ransomware attack is to scan for and remove elements of this nasty ransomware infection using reputable malware remediation software. Additionally, to mitigate possible damages in the event of a future ransomware infection, you should keep backup copies of your valuable data on an external hard disk or a cloud drive.