ODIN ransomware hails from an infamous family of Locky virus. This cyber threat was released as the addition to the notorious campaign that has already affected thousands of computer users who found their files useless. According to experts, this ransomware is named after its exceptional feature – it can encrypt your files and append .odin file extension to each of them. Next, it drops HOWDO_text.html and similar files on your computer’s desktop that let you know about a special ransom that you need to pay in exchange for the decryption key. As the original virus is continuously developing and keeping the virtual community under its shadow of terror, you should be extremely careful with this malware. Though it is not difficult to remove ODIN virus itself, the decryption of files is a complicated matter. Fortunately, 2-spyware researchers have already found several methods that can be used for recovering files. If you are already infected and misfortune enough not to have backups of your encrypted files, collect yourself. First of all, it is necessary to complete proper and full ODIN virus removal in order to proceed to file recovery.
It seems that the main reason why we have to deal with Odin is the success of Locky virus which exceeded its developers’ expectations. Most probably, they decided to retain the title of most dangerous ransomware threat for a longer while and presented ODIN. Since the emergence of its original version in February, the world has seen already several versions ,e.g., Zepto, Bart, Thor, etc. Now the hackers could not resist the current trend to name the ransomware after movie or fictional characters and gave their virus a grand name as well. As well as the original bearer of this name – Odin – the oldest and main deity in Norse mythology, the virus also tries to invoke similar overwhelming impression. It employs common RSA-2048 and AES-128 encryption algorithms to encode personal files. Since these strategies are based on a mathematical equity, it is a difficult task to find an alternative private key for the unique public key.