Jump to content

Recommended Posts

I have a computer which has been encrypted and an explosion of encrypted files has the form:
crypted_asano @ cock_email
The catalog with encrypted files contains the following information:





Your files are encrypted!

Your documents, photos, databases and all the rest files encrypted cryptographically strong algoritm.
Without a secret key stored with us, the restoration of your files is impossible
You will be able to restore files so:
  • To contact us by e-mail: [email protected] & send your personal ID and 3 crypted files, up to 3 MB in size everyone.
  • We will decipher them, as proof that we can do this. Also you receive the instruction where and how many it is necessary to pay.
  • You pay and confirm payment.
  • after payment you receive the DECRYPTOR program, which restored ALL YOUR FILES.
Your personal ID:
----------------------------- P.S. ----------------------------------
  • It is in your interest to respond as soon as possible to ensure the recovery of your files, because we will not store your decryption keys on our server for a long time.
  • If we do not respond to your message for more than 48 hours, write to the backup email : [email protected]



How can I decrypt files?


Link to post
Share on other sites


Link https://id-ransomware.malwarehunterteam.com/identify.php?case=956727ac8539590f744e8d08ebc831c374b429d0


1 Result
GlobeImposter 2.0
This ransomware has no known way of decrypting data at this time.

It is recommended to backup your encrypted files, and hope for a solution in the future.

Identified by

    ransomnote_filename: how_to_back_files.html
    custom_rule: victim ID in encrypted file




Best regards,


Link to post
Share on other sites

There's currently no known way to decrypt files that have been encrypted by GlobeImposter 2.0 without first obtaining the private key from the criminals who made/distributed the ransomware. Since the ransomware generates new public and private keys for every computer it infects, it isn't even possible to use a decryption tool that was given to another victim who paid the ransom.

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    No registered users viewing this page.

  • Create New...