Is GC47 Ransomware a new version of the Cerber virus?

GC47 Ransomware belongs to the infamous group of malware based on Hidden Tear Project. It is still in the development stage. This means that hackers are not massively attacking users but rather «testing» their malware.

This ransomware utilizes the AES encryption method to make valuable files on your computer unreadable by the OS. After finishing the encryption process, GC47 Ransomware creates a message on the desktop to notify the owner of the compromised computer. This virus is also capable of altering Windows Registry which allows launching the virus whenever Windows OS starts.

We advise making backups for most important files on your computer. GC47will most likely target files with the following extensions:  .txt, .doc, .docx, .xls, .xlsx, .pdf, .pps, .ppt, .pptx, .odt, .gif, .jpg, .png, .db, .csv, .sql, .mdb.sln.php, .asp, .aspx, .html, .xml, .psd, .frm, .myd, .myi, .dbf, .mp3, .mp4, .avi, .mov, .mpg, .rm, .wmv, .m4a, .mpa, .wav, .sav, .gam, .log, .ged, .msg, .myo, .tax, .ynab, .ifx, .ofx, .qfx, .qif, .qdf, .tax2013, .tax2014, .tax2015, .box, .ncf, .nsf, .ntf, .lwp. All encoded files will have the .cerber3 or .Fuck_You file extension added to them. In addition to that, it might also delete your Shadow Volume Copies to limit your recovery options.

As for the ransom itself, hackers promise to fix your files for 50 bucks (in Bitcoins) implying that there is no other way to decrypt the data without a key and their decryption program. When your sensitive files are corrupted, you will most likely succumb to paying the ransom, but we recommend focusing on GC47 Ransomware removal instead.

First of all, never the believe those crooks. It is a common practice to threaten victims and making them think that they are out of options. There are no guarantees that cyber criminals will actually unblock your computer and restore the data. Plus, you will become a sponsor for next attacks contributing to the development of newer viruses and malicious software like this one.

We still don’t have a full list of the main spreading techniques for this ransomware, but it is safe to say that most common strategies are in use. We’re talking about typical stuff like:

–    Software installers: malware programs often come bundled with other software you might need. Unchecking all unneeded boxes during the installation is a must. Be careful with the programs that come from untrusted sources.

–    Malware spam: emails are still one of the most popular methods of distributing malicious software like this one. Suspicious attachments, unknown links, executable files, etc. in emails should not be opened. It is always a risk to get infected in one click.

–    Redirects: sites are getting hacked each day, and malicious ads and hijackers are there for unsuspecting users ready to infect users with viruses and other malware.

There are two ways to get rid of the GC47 Ransomware. You can do it manually if you know where the original malicious file is hidden. But it might take time. Plus, if you don’t know where to look you can accidentally delete wrong files. To avoid this, we recommend using a reliable anti-malware program like Plumbytes Anti-Malware or SpyHunter. If your computer is infected with GC47 Ransomware, it will be eliminated along with other threats found. Having an additional protection against cyber-attacks is highly recommended because other threats might come your way after previous are neutralized.

GC47 Ransomware Removal Instruction

Automatic Removal for GC47 Ransomware

Symptoms of GC47 Ransomware infection on your computer can be: computer crashes, unusual homepage or search engine on your browser, unwanted pop-up ads and advertising banners. We recommend to download our automatic removal tool. This removal tool has been tested for GC47 Ransomware threat removal and it is easy to use.

You are running: Windows.
This Tool is Compatible With: Compatible with Windows XP Compatible with Windows Vista Compatible with Windows 7 Compatible with Windows 8/8.1 Compatible with Windows 10
For quick and easy removal of GC47 Ransomware threat, we recommend to download SpyHunter 4 removal tool. SpyHunter 4 by Enigma Software is an anti-malware utility certified by West Coast Labs Checkmark Certification System. Enigma Software has been awarded by various media sources such as CNN.com, USA Today, PC World and Forbes.com. Our tests have proved that SpyHunter 4 has one of the supreme detection and removal ranks for GC47 Ransomware.

Removal GC47 Ransomware with the help of technical experts

If you have difficulty to remove GC47 Ransomware threat by using an automatic removal tool or you have any questions, you can call our professional technical support and they will gladly help you.
Need help? Call us to get
expert technical support
Call now for technical support

Manual Removal Instruction for GC47 Ransomware

Step 1
UNINSTALL GC47 RANSOMWARE AND RELATED PROGRAMS
Windows XP / Vista / 7
  • Click on the Start button in the left lower corner and select → Control Panel. After that find the Programs and Features (if you are running Windows XP , then click on Add/Remove Programs).
    GC47 Ransomware remove from Windows - step 1.1
Windows 8/8.1/10
  • If you are running Windows 8 or Windows 10 operating system , then right-click on the Start which is in the lower left corner of the screen. After that select Control Panel and go to Programs/Uninstall a Program.
    GC47 Ransomware remove from Windows - step 1.2
Uninstall GC47 Ransomware and related programs
  • In the list of installed programs find the GC47 Ransomware or any other recently installed suspicious programs.
  • Click on them to select and then click on Uninstall button to remove them.
    GC47 Ransomware remove from Windows - step 1.3
Step 2
REMOVE GC47 RANSOMWARE FROM YOUR WEB BROWSERS
  • Step 3
Remove suspicious add-ons
  • Open Internet Explorer, click on the Gear icon (IE menu) on the upper right corner of the browser and select Manage Add-ons.
    Remove GC47 Ransomware from Internet Explorer - Step 2.1
  • You will see a Manage Add-ons window. Now, find the GC47 Ransomware and other suspicious add-ons. Disable them by right clicking and selecting Disable:
    Remove GC47 Ransomware from Internet Explorer - Step 2.2
How to change your homepage if it was modified by browser hijacker:
  • Click on the gear icon (menu) on the upper right corner of the browser and select Internet Options.
  • On General tab remove unwanted URL and enter your desired domain name such as google.com. Click Apply to save changes.
    Remove GC47 Ransomware from Internet Explorer - Step 2.3
Resetting Internet Explorer browser
  • Click on the gear icon (menu) again and chose Internet options. Go to Advanced tab.
  • Now click on Reset button, the new window should appear. Select the Delete Personal settings option and click on Reset button again. Now you have deteled GC47 Ransomware completely.
  • Remove GC47 Ransomware from Internet Explorer - Step 2.4
Remove suspicious extensions
  • Open Mozilla Firefox, click on the menu icon which is located in the top right corner. Now select Add-ons and go to Extensions.
  • Remove GC47 Ransomware from Mozilla Firefox - Step 2.1
  • Now you can see the list of extensions installed within Mozilla Firefox, simply select GC47 Ransomware and other suspicious extensions and click on remove button to delete them.
  • Remove GC47 Ransomware from Mozilla Firefox - Step 2.2
Resetting Mozilla Firefox
  • Click on the Firefox menu icon which is on the upper left corner of the browser and click on the question mark. Now, choose Troubleshooting Information option.
  • Remove GC47 Ransomware from Mozilla Firefox - Step 2.3
  • New windows will pop-up where you can see Refresh Firefox to its default state message and Refresh Firefox button. Click this button to remove GC47 Ransomware completely.
  • Remove GC47 Ransomware from Mozilla Firefox - Step 2.4
Remove suspicious extensions
  • Open Google Chrome, click on the menu icon in the upper right corner and select More Tools and then select Extensions.
  • Remove GC47 Ransomware from Google Chrome - Step 2.1
  • Now, find the GC47 Ransomware and other unwanted extensions and click on trash icon to delete them completely.
  • Remove GC47 Ransomware from Google Chrome - Step 2.2
  • Click on menu icon once again and select Settings and then Manage Search engines it will be right under the Search section.
  • Remove GC47 Ransomware from Google Chrome - Step 2.3
  • Now you will see all of the Search Engines installed in your browser. Remove any suspicious search engines. We advise you to leave only Google or your preferred domain name.
  • Remove GC47 Ransomware from Google Chrome - Step 2.4
Resetting Google Chrome
  • Click on menu icon which is on the top right corner of your Google Chrome browser. Now select Settings. Click Show Advanced Settings...
  • Scroll down to the end of the page and find there Reset settings and click on it.
  • Remove GC47 Ransomware from Google Chrome - Step 2.5
  • New window will pop-up where you click on Reset button to confirm the action and remove GC47 Ransomware completely.
  • Remove GC47 Ransomware from Google Chrome - Step 2.6
Step 3
FINAL GC47 RANSOMWARE REMOVAL PROCEDURE

After performing all of the steps above you should have all of your web browsers clean of the GC47 RANSOMWARE and other suspicious add-ons and extensions. However to complete the removal procedure we strongly advise to scan your computer with antivirus and anti-malware tools like SpyHunter, HitmanPro 32-bit, HitmanPro 64-bit or Malwarebytes Anti-Malware. Those programs might help to you find registry entries of malware and remove them safely.

Information added: 03/13/2017 10:50 PM;