Researchers from security firm ESET have noticed the hackers hard-coded the ransomware key. Even better: After digging into the code, the researchers were able to extract key. To remove the malicious app, simply enter the following code: 4865083501. [Read: Apple’s new sub-$1k MacBook Air finally ditches the dreaded butterfly keyboard]

— ESET research (@ESETresearch) March 17, 2020 It remains unclear how users fell for the Coronavirus Tracker ransomware, but DomainTool, the company which first unearthed it, notes the campaign doesn’t seem to have spread widely. Still, the code should come in handy to those affected. As we previously reported, hackers are exploiting the coronavirus pandemic to spread malware. Indeed, domains with coronavirus-related names are 50% more likely to infect your system than any other domains. Researchers further warn there’s a surge in malicious coronavirus maps and dashboards. If you’re still looking for an app to track the spread of coronavirus, make sure to pick one from a legitimate source — we’ve got some suggestions for you. For more information about the coronavirus, please visit the following sources:

World Health Organization COVID-19 Q&A European Center for Disease Control and prevention facts on COVID-19 Center for Disease Control COVID-19 facts