Loches is a malicious strain of ransomware belonging to the GlobeImposter family. It is a highly destructive cyber threat that encrypts users’ files and demands a ransom in exchange for the decryption key. This ransomware is particularly dangerous due to its use of RSA and AES encryption techniques, making the encrypted files inaccessible without the decryption key held by the attackers. In this article, we will provide a detailed overview of Loches, how it functions, the methods of infection, its symptoms, and how to remove it. We will also cover preventive measures to avoid future infections and offer an SEO-friendly guide to improve search engine optimization.
Loches Ransomware: Overview and Threat Summary
The Loches ransomware is part of the notorious GlobeImposter ransomware family, which is responsible for a variety of similar threats. It is typically distributed via infected email attachments, malicious ads, and torrent websites. Once executed, Loches encrypts important files on the infected computer and appends the “.loches” extension to each file. The victims are then presented with a ransom note named “how_to_back_files.html”, which instructs them on how to pay the ransom and obtain the decryption tool.
Threat Summary
Attribute | Details |
---|---|
Threat Type | Ransomware, Crypto Virus, File Locker |
Encrypted File Extension | .loches |
Ransom Note File Name | how_to_back_files.html |
Associated Email Addresses | rudolfbrendlinkof1982@tutamail.com, robertokarlosonewtggg@outlook.com |
Detection Names | Avast (Win32:RansomX-gen [Ransom]), Combo Cleaner (Generic.Ransom.GlobeImposter.599F404E), ESET-NOD32 (A Variant Of Win32/Filecoder.FV), Kaspersky (HEUR:Trojan.Win32.Generic), Microsoft (Ransom:Win32/Filecoder.RB!MSR) |
Symptoms of Infection | Files cannot be opened, file extensions changed to “.loches”, ransom note displayed, system slowdown. |
Damage | File encryption, potential data theft, financial loss, reputation damage, further malware infections |
Distribution Methods | Infected email attachments, malicious ads, torrent websites, compromised websites, and software vulnerabilities |
Danger Level | High – Potential for severe financial and data loss, as well as privacy breach |

Remove
Loches Ransomware
With SpyHunter
How Loches Works: Infection Process and Ransom Demands
When Loches ransomware infects a computer, it performs several damaging actions:
- File Encryption: The malware encrypts critical files on the system, appending the “.loches” extension. This includes documents, photos, videos, and other important data.
- Ransom Note: A ransom note named “how_to_back_files.html” is dropped on the victim’s system. The note informs the user that their files have been encrypted using RSA and AES encryption, and only the attacker possesses the decryption key.
- Ransom Demand: The note demands that the victim contact the cybercriminals via two email addresses provided within the note. The attackers also claim to have gathered sensitive personal data and threaten to release or sell this information unless the victim pays the ransom.
- Free Decryption Offer: The attackers offer to decrypt 2-3 non-critical files for free to prove their legitimacy. They insist that the victim refrain from using third-party decryption tools, as they could permanently corrupt the encrypted files.
- Increasing Ransom: The ransom price increases if the victim does not contact the cybercriminals within 72 hours.
Text in the ransom note:
YOUR PERSONAL ID:
-
/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\
All your important files have been encrypted!
Your files are safe! Only modified. (RSA+AES)
ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE
WILL PERMANENTLY CORRUPT IT.
DO NOT MODIFY ENCRYPTED FILES.
DO NOT RENAME ENCRYPTED FILES.
No software available on internet can help you. We are the only ones able to
solve your problem.
We gathered highly confidential/personal data. These data are currently stored on
a private server. This server will be immediately destroyed after your payment.
If you decide to not pay, we will release your data to public or re-seller.
So you can expect your data to be publicly available in the near future..
We only seek money and our goal is not to damage your reputation or prevent
your business from running.
You will can send us 2-3 non-important files and we will decrypt it for free
to prove we are able to give your files back.
Contact us for price and get decryption software.
email:
rudolfbrendlinkof1982@tutamail.com
robertokarlosonewtggg@outlook.com
* To contact us, create a new free email account on the site: protonmail.com
IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.
How to Remove Loches Ransomware: Step-by-Step Guide

Remove
Loches Ransomware
With SpyHunter
If you have fallen victim to Loches ransomware, it is crucial to act immediately to minimize the damage and recover your files. While paying the ransom is never guaranteed to work, you can attempt to remove the ransomware and attempt file recovery using the following methods:
Step 1: Disconnect the Infected Device
To prevent further encryption, immediately disconnect your computer from the internet and any local networks. This will prevent the malware from spreading to other devices or accessing the attacker’s server.
Step 2: Use SpyHunter to Scan for Ransomware
SpyHunter is an effective tool for detecting and removing ransomware like Loches. Follow these steps:
- Download SpyHunter.
- Install the software on your device.
- Launch SpyHunter and click “Scan” to initiate a full system scan.
- Once the scan is complete, review the results and identify the ransomware threat.
- Select “Fix” to automatically remove Loches and any other identified malware.
Step 3: Recover Your Files
While there is no guaranteed way to recover encrypted files without the decryption key, you can try the following options:
- Restore from Backup: If you have a backup of your files, restore them from a clean, uninfected backup.
- Third-Party Decryptors: Occasionally, cybersecurity experts release decryption tools for specific ransomware strains. Check for any available decryption tools that could help you recover your files.
- File Recovery Software: In some cases, you may be able to recover previous versions of encrypted files using file recovery software.
Step 4: Monitor Your System for Additional Threats
After removing Loches, it is important to run a comprehensive system scan with SpyHunter or another trusted antivirus tool to ensure no remnants of the malware remain. Monitor your system for unusual behavior, which could indicate additional infections.
How to Prevent Future Ransomware Infections
Preventing ransomware attacks is always better than dealing with an infection. Here are some effective preventive methods to protect yourself and your data:
- Keep Software Updated: Ensure your operating system, applications, and antivirus software are always up to date with the latest security patches.
- Use Trusted Security Software: Employ reputable antivirus software, like SpyHunter, to protect your system against malware, including ransomware.
- Avoid Suspicious Emails: Never open email attachments or click on links from unknown senders. Be cautious with unexpected emails, even if they appear to come from a known contact.
- Backup Data Regularly: Maintain regular backups of your important files, and store them in a secure, offline location or on a cloud service.
- Be Careful with Software Downloads: Only download software from trusted sources or official websites. Avoid pirated software or cracks, as these are common methods for distributing ransomware.
- Use Multi-Factor Authentication (MFA): For sensitive accounts, enable MFA to add an extra layer of security.
Conclusion
Loches ransomware is a dangerous and highly effective malware strain that encrypts users’ files and demands a ransom for their decryption. Understanding how it works, how to remove it, and how to protect yourself from future infections is crucial for mitigating the damage caused by such attacks. Using trusted tools like SpyHunter and adhering to preventative security measures can significantly reduce the risk of falling victim to ransomware.

Remove
Loches Ransomware
With SpyHunter