eKing Ransomware: What You Need to Know & How to Recover Fast

eKing Ransomware is a highly aggressive ransomware strain, known for its fast encryption and extortion tactics against businesses of all sizes. Discover how it operates, review real-life cases, and get expert help to recover your data and resume operations.

Get Help Now

What is Phobos Ransomware?

If you are unable to access your data, receive notice that your files have been encrypted, and see a demand for a ransom to regain access, it may mean your system is infected with eKing ransomware.

eKing Ransomware is a variant of the Phobos Ranswomare family  and has been known to the cybersecurity community since August of 2021. Files encrypted by eKing generally have “eking” as a file extension. It uses both AES encryption standards. There is currently no known free decryptor for eKing.

Info card image
Disables Backups
Actively seeks and deletes backups to prevent easy recovery after encryption.
Info card image
Spreads Through Networks
Targets entire IT infrastructures, not just single devices.
Info card image
Persistence Mechanisms
Installs hidden tools to maintain long-term access and re-infect systems.
Info card image
You are unable to use your antivirus software or find it deactivated.

Why You Shouldn’t Attempt to Fix It Alone

If eKing ransomware has hit your business, taking the wrong steps can cause permanent data
loss or legal risks. Like a crime scene, a ransomware attack must be preserved—tampering
with encrypted files, attempting self-recovery, or engaging with attackers can destroy
critical evidence and reduce your chances of recovery.

The right response in the first moments after a eKing attack can make the difference
between full recovery and permanent data loss. Follow these critical steps to protect your
data and maximize your chances of restoring operations.

Intro right image

If you find a “ReadMe” note on your system showing information like the above, you’ve likely suffered a eKing Ransomware attack.

Do not alter or interfere with the data.

Steps bg image

What should I do if and when my data has been encrypted by eKing?

If you’ve fallen victim to ransomware, follow these crucial steps:

1

Request 24/7 Ransomware Recovery Help

Get expert guidance to assess, contain, and recover safely.

2

Isolate Infected Systems

Disconnect infected devices to stop the spread. Avoid self-recovery.

3

Preserve Evidence Immediately

Keep ransom notes & logs. Do not restart or modify anything.

eKing ransomware statistics & facts

RANSOM AMOUNTS

The groups that operate eKing ransomware are known for targeting medium sized organizations. The gang is known to customize ransom demands based on the annual revenue of their victims.

The average eKing ransom amount ranges from $5,000-$30,000. Ransoms are usually paid in Bitcoin. Most quick-buy methods of purchasing Bitcoin via methods like PayPal or credit card will also apply a fee of up to 10%

AVERAGE RANSOM, USD $

AVERAGE LENGTH

The eKing ransomware downtime is a bit longer than other ransomware attacks. The manual process of email-based communication with the attackers can add a considerable delay in the response time.

Depending on your company size and how often you use systems in your day to day business, this is the most expensive part of this incident. Additional to the unavailability of your systems, this is damaging your company reputation.

Your goal should be to get your systems back to a productive state as soon as possible. The best way to do this is to call in experts, which have a vast knowledge of eKing ransomware and get the IT-systems back up running.

CASE OUTCOMES

In our experience, a successful ransom payment usually results in getting a working eKing decryptor. Decryptor tools do take work to maintain, however, so not all attackers have working tools.

It’s important to know which gang you are dealing with. Some attackers are careful to maintain a good reputation, and always provide working eKing decryptors. Others are known to be scammers, and will never provide a decryptor after receiving payment.

COMMON ATTACK VECTORS

The most common attack vector for eKing ransomware is phishing.

Name
eKing / eKing Locker/ eKing Ransomware
Danger lever
Very High. Advanced Ransomware which makes system changes and encrypts files
Release date
2021
OS Affected
Windows
Appended files extensions
.eking
Ransom note
"info.txt" or "info.hta"
Contact Email Address
[email protected][email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], ICQ@fartwetsquirrel, [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], yoursjollyroger@cock, [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected]
Known scammers
None

How to identify eKing ransomware

This is an average eKing ransomware note. (With slight redaction in the interest of public safety)

eKing.txt
All your files have been encrypted! Your PC has been infected by a ransomware. If you want to restore them, contact the following address below. E – Mail contact – [email protected] / [email protected] If there is no answer in 24 hours. Try to contact us via Sonar. – Download TOR browser hxxps://www.torproject.org/download/ – While using your TOR browser copy and paste the URL below: hxxp://xxxxxxxxxxxxxxxxx.onion/ – Register an account and message us in our ID : decphob – If the TOR link is not working go to hxxps://onion.live Write this ID in the title of your message – Free decryption as guarantee Before paying you can send us up to 5 files for free decryption. The total size of files must be less than 4Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.) Where to buy bitcoins? The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click ‘Buy bitcoins’, and select the seller by payment method and price. hxxps://localbitcoins.com/buy_bitcoins Also you can find other places to buy Bitcoins and beginners guide here: hxxp://www.coindesk.com/information/how-can-i-buy-bitcoins/ Attention! NEVER RENAME ENCRYPTED FILES THIS MAY CAUSE DAMAGE TO YOUR FILES PERMANENTLY Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

eKing decryptor demonstration

This is a technical demo of the eKing Decryptor. Copyright by BeforeCrypt

Experiencing Ransomware or Cyber Breach?

Get Help Now

Frequently asked questions

How Does Ransomware Encrypt Files?

Ransomware encrypts files using advanced cryptographic algorithms, typically AES (Advanced Encryption Standard) or RSA (Rivest-Shamir-Adleman). Once executed, the malware scans the system for specific file types and encrypts them, making them inaccessible to the user. Some variants use symmetric encryption (AES), while others combine it with asymmetric encryption (RSA) to lock files with a unique key pair.

Can You Decrypt My Ransomware Encrypted Files?

Decryption depends on the ransomware variant. In some cases, publicly available decryption tools exist, but not all attacks have a known solution. You can submit a free ransomware recovery request, and we will check for possible decryption methods.