How to Decrypt Files Encrypted by Legion Ransomware

Legion ransomware is a deadly malware and it ends up renaming and encrypting your important files on a Windows PC. After encrypting the files, it displays a message – “your data is encrypted with latest encryption algorithm”. In order to decrypt the files, the ransomware advises to contact someone over an email address. Among some of the other changes made to your system, it changes the Windows desktop wallpaper, displays a popup notification about encrypted files and locks some of the system functions so that you cannot manually undo the changes.

But thanks to the tools available from AVG, you can decrypt the files that were encrypted by Legion ransomware easily without having to pay anyone or contact anyone. This tool works in a wizard like interface and guides you through all the steps. Here is how:

  1. Download the AVG Decryptor for Legion ransomware from https://www.avg.com/en-us/ransomware-decryption-tools#legion.
  2. Boot the infected system in the safe mode and launch the legion decryptor from there.
  3. Click on the “Next” button to proceed with the tool.Legion Decryptor
  4. Choose the hard drive that you want to decrypt – you can select local drive, network drive or a particular folder. Click on the “Next” button.
  5. Choose whether you want to backup the encrypted files before an attempt is made to decrypt them. Finally click on the “Decrypt” button to start the decryption process.
  6. At the end of the decryption, you will be shown a summary and advised to install a full antivirus product like AVG antivirus on your Windows PC.Legion Decryptor

Chances are that your computer was infected because you do not have a good regular antivirus software installed on your system. In order to prevent any future malware infections, you should install any good antivirus software such as AVG antivirus, Bitdefender antivirus or ESET antivirus.

You can download Legion Ransomware Decryption Tool from https://www.avg.com/en-in/ransomware-decryption-tools#legion.