The HAM ransomware is the latest file-encrypting malware to be seen online, and it is a part of the infamous Dharma ransomware family. The guide below will give you a clear insight on how to remove HAM ransomware from your computer without going through several time-consuming manual steps.
Data-encrypting malware is a profitable venture for cyber crooks, especially now that they are so easily accessible. Cybercriminals have a whole heap of ransomware families to pick from, and they can often use them to hold victim’s files hostage with asymmetric encryption. This type of cryptography technique uses unique private keys to encrypt and decrypt a file – meaning – the encryption is impossible to reverse for free.
What is HAM Ransomware?
HAM is a piece of malicious software which is created to encrypt all major file types (audios, videos, images, documents, archives, etc.) stored on a device and demand a ransom fee in the form of Bitcoin cryptocurrency for a decryption toolkit.
Immediately after penetration, HAM ransomware renames all encrypted files by adding “.[email@example.com].HAM” extension to their names. For instance, a file originally named “1.jpg” would appear as “1.jpg.[firstname.lastname@example.org].HAM” following encryption.
Following the completion of this process, HAM ransomware informs victims about the encryption by dropping the “FILES ENCRYPTED.txt” text file (ransom note) into compromised folders.
The ransom note usually contains instructions on how to contact the developers of the ransomware and pay a fee to get the decryption key.
HAM Ransomware: Common Distribution Techniques
Below we have listed some techniques by which cyber crooks opt to distribute malware-infected programs such as this type of ransomware into the targeted systems.
- Malicious spam emails and junk attachments
- Exploit Kits
- Untrustworthy download sources
- Pornographic websites
- Peer-to-Peer file-sharing networks
- Outdated operating systems and internet browsers
- Intrusive pop-up advertisements
How to Remove HAM Ransomware from your computer?
In order to safely remove HAM ransomware and other types of harmful malware infections, you can simply try running a scan with a powerful antivirus/ anti-malware software on the compromised system.
Apart from this, you are advised to follow the Internet security tips shared below to protect your computers, laptops, and mobile devices from hackers and viruses.
- Never open or download an email attachment unless you know the sender.
- Keep your OS and installed software programs up to date.
- Avoid connecting to free public Wi-Fi networks and unknown hotspots.
- Backup your valuable data to cloud storage or external devices.