Jump to content

Amigo-A

Visiting Expert
  • Posts

    2466
  • Joined

  • Last visited

  • Days Won

    63

Posts posted by Amigo-A

  1. 2 hours ago, Yasathis said:

    offline ID: rpx4UUTYZiAR5omq187UvM233jloVHyJUkA8s3t1

    Yes, as in the answer: In the future it will be possible to decrypt files if a decryption key is added to the decryptor.
    The addition of a key depends on the voluntary transfer of that key by someone who paid a ransom and decrypted their files.
    No one can influence the acceleration of this event. We can only hope that this happy event will happen.

  2. Hello @Grzegorz Qfi

    This guide should answer all questions related to this ransomware variant.
    Encrypted files do not need to be deleted if you need them. It is recommended to save them on an external drive and disconnect it from the computer. Perhaps in the future, extortionists will release master-keys or their servers will be arrested by the police.

    Try to get yourself together and start backing up your most important files to an external drive and cloud storage so that you have at least one copy of your most important and valuable files. These can be family and personal photos, happy moments of the video, important documents, including very confidential ones. If you do it 1 time, then after that you will do it quickly and on autopilot.

  3. 14 minutes ago, Kaelye said:

    t1
    Notice: this ID appears be an offline ID, decryption MAY be possible in the future

    Hello.

    Adding a key to the Emsisoft Decryptor depends on the case, for example, when someone buys it from ransomware and voluntarily shares it with the developers of the decryptor, and this key will be compatible with the one used to encrypt your files. This is the simplest explanation. 
    Sometimes it happens quickly, and sometimes it never happens. We have no influence on the acceleration of this process. It is recommended to periodically download a new version of the decryptor and check the possibility of decrypting your files. For example, once every 2 weeks.

    It is advisable to transfer the encrypted files to an external drive and disconnect it from the PC. Leave only several folders with copies of these files to periodically check for decryption. 

  4. @Ankush

    Emsisoft Employee has already answered your questions.

    I'll add a little.

    Methods for restoring DOC files damaged under normal conditions will not help restore a file after encryption. We understand that files are important to you, but we are not wizards to wave our hand and turn things around. This is impossible, alas.

  5. I also want to warn you against feverishly searching the Internet for other decryptors. They don't exist, but there are sites and their actors that lure users to their site and plant a fake decryption tool that is unlikely to prove empty and harmless. More likely, it will steal personal information from browsers and online wallets that is still on your PC or was entered by you after the attack.

  6. I also want to warn you against feverishly searching the Internet for other decryptors. They don't exist, but there are sites and their actors that lure users to their site and plant a fake decryption tool that is unlikely to prove empty and harmless. More likely, it will steal personal information from browsers and online wallets that is still on your PC or was entered by you after the attack.

  7. Hello, @Ankush @omar elkady

    This guide says if the files are encrypted with an online key, it is impossible to decrypt them without paying a ransom. 

    Paying the ransom is not recommended so as not to sponsor extortionists to commit new acts. 

    It is recommended to collect the encrypted files and transfer them to an external drive to disconnect them from the PC later. 

    It is possible that extortionists will be arrested in the future and decryption keys will be added to the new decryptor. 

  8. Hello.

    Quote

    Your personal ID:
    0415***dO

    This guide says if the files are encrypted with an online key, it is impossible to decrypt them without paying a ransom. 

    Paying the ransom is not recommended so as not to sponsor extortionists to commit new acts. 

    It is recommended to collect the encrypted files and transfer them to an external drive to disconnect them from the PC later. 

    It is possible that extortionists will be arrested in the future and decryption keys will be added to the new decryptor. 

  9. Hello. 

    This guide says if the files are encrypted with an online key, it is impossible to decrypt them without paying a ransom. 

    Paying the ransom is not recommended so as not to sponsor extortionists to commit new acts. 

    It is recommended to collect the encrypted files and transfer them to an external drive to disconnect them from the PC later. 

    It is possible that extortionists will be arrested in the future and decryption keys will be added to the new decryptor. 

     

  10. Hello. 

    This guide says if the files are encrypted with an online key, it is impossible to decrypt them without paying a ransom. 

    Paying the ransom is not recommended so as not to sponsor extortionists to commit new acts. 

    It is recommended to collect the encrypted files and transfer them to an external drive to disconnect them from the PC later. 

    It is possible that extortionists will be arrested in the future and decryption keys will be added to the new decryptor. 

  11. Yes, this is a new variant of STOP Ransomware.

    Unfortunately, the personal ID indicates that the encryption used an encryption key generated on the server of extortionists.

    In this case, it is recommended to save the files to an external drive; perhaps decryption keys will be released in the future or law enforcement will seize the server of extortionists. Both cases are unlikely, but sometimes they happen.

  12. Hello @Xenshyo

    Yes, technology is advancing. But someone is always using it for other purposes, like creating deadly weapons and selling them to kill people. Or to create ransomware that uses encryption.
    Encryption has been developed since ancient times, later a certain group of smart people created strong encryption and related technologies. Now people who create ransomware use these technologies for criminal activities and take money from people.
    However, the money issue is also quite ancient, they are used to pay for goods/things and/or get rich, all technologies are tied to money or their more expensive equivalents in one way or another. 

    Nowadays, even the best supercomputer is not powerful enough to calculate and search through all the possible decryption keys. Moreover, who would lend it to us? 

    In addition, we can hope that the extortionists will stop their criminal activities and someday publish the decryption keys for all the victims. Such cases are quite rare, but they do happen, so it is better to save encrypted files for the future. 

×
×
  • Create New...