We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Ransom:Win32/WastedLocker.WT!MTB
Aliases: No associated aliases
Summary
The WastedLocker ransomware first appeared in May 2020. This ransomware encrypts the data on your disk and can stop you from using your device or accessing your data. It encrypts files, renders them inaccessible, and demands payment for the decryption key.
WastedLocker is typically deployed during human-operated ransomware campaigns. Operators have used fake browser updates to lure users into downloading malicious content, which initates a process and eventually allows the operators to deliver the ransomware. It renames encrypted files with a .eswasted extension.
For information about WastedLocker, and other human-operated ransomware campaigns, read these blog posts:
Ransomware groups continue to target healthcare, critical services
Human-operated ransomware attacks: A preventable disaster
There is no one-size-fits-all response if you have been victimized by ransomware. To recover files, you can restore backups. There is no guarantee that paying the ransom will give you access to your files.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.