.micro virus....!!! yeah.... this is ransomware virus (such as crytolock in 2015). This virus make all your file ( such as document,photo etc) turned to ".micro File Extentions" and make that's file unable to accessed/opened. It has encrypted your files and now they want money to give you the unlock key.
This virus (.micro File Extension) is a very harmful infection that silently infiltrates into targeted windows computer without seeking for any approval and hides itself behind the system background. You won’t recognize its arrival as it infiltrates very secretly and via various internet sources. Below some of the common source are discussion that makes invasion of harmful parasites into compromised machine.
This virus (.micro File Extension) is a very harmful infection that silently infiltrates into targeted windows computer without seeking for any approval and hides itself behind the system background. You won’t recognize its arrival as it infiltrates very secretly and via various internet sources. Below some of the common source are discussion that makes invasion of harmful parasites into compromised machine.
- Social Media : Visiting malicious websites, unsafe web pages, phishing domain and unauthentic web pages are the major ways for the invasion of creepy computer threats.
- Drive By Download : This very malware usually comes bundled with freeware software installers, unsafe programs and third party application programs from the unsafe Internet sources.
- Peer to peer File Sharing : Sharing infectious programs, copyrighted content, pornographic materials, malicious files etc. over the network also allow malware threats like .micro File Extension to invade your Windows computer.
- Open Spam Email Attachments : When you open spam emails or download its suspicious attachments, then such malware bug may get inside your PC. It is the basic source for virus penetration.
- Infected Removal Devices : Use of infected external devices such as DVD, CD, pen drive etc. may inject .micro File Extension like harmful bugs into your victimized computer. so, you should be careful before using any external devices.
- Browser (such as Chrome, Firefox, IE etc) :
- Avoid clicking on suspected links without analyzing the risk.
- Avoid websites that impersonate as legitimate site or appears malicious.
- Do not trust on fake claims to make your Internet connection for fast downloads without paying any extra Internet charge.
- Free software packages that convey bundled applications may prove dangerous for security and stability of your computer.
- Some questionable domains ask you to enable or install extra features to easily plant malicious contents on your system. Beware of such sites.
- Always use a well configured and secure web browser.
- You should decide the role of ActiveX, Java, JavaScript, Cookies and extensions. You should disable these web browser features unless you need it in real.
- Always use strong and updated antivirus.
- Use utility programs to remove unwanted temporary files, cookies and orphan registry files.
If your computer is infected by this virus , your desktop will appear .TXT file as shown below and many of your files have turned into .micro files, and are unable to be opened.

So for now, I suggest always backup your important files or clean reinstall the Operating System or format your hard drive ( if you don't have important files). For those of you who have not been infected with this virus , my advice keep backing up your important files and enable system restore and shadow copy on your windows system . so if something happens to your files , you can easily restore your files to an earlier time.

So for now, I suggest always backup your important files or clean reinstall the Operating System or format your hard drive ( if you don't have important files). For those of you who have not been infected with this virus , my advice keep backing up your important files and enable system restore and shadow copy on your windows system . so if something happens to your files , you can easily restore your files to an earlier time.
Comments
Post a Comment