Recommended Posts

On 5/15/2019 at 8:54 PM, Amigo-A said:

Hello. We are pity this happened. 

It is Rapid Ransomware

Extension: .no_more_ransom
Email: [email protected], [email protected]
ID pattern: ID - ID-XXXXXXXX

This version of Rapid Ransomware has no known way of decrypting data at this time.

Is there progress on this?  

I am also hassled by this .  I still don't know how it could happen on my pc. Is was "locked" .  Does anyone heve a clou for "tighter"  settings of my network. ?  And in which logfile I could retrieve information about which process ( exe of other ) did the encryption? 

Thx for all the tips?

 

A Dombo(victum)

Share this post


Link to post
Share on other sites
1 hour ago, dombo-vic said:

Is there progress on this?

I haven't heard anything new about it.

I recommend keeping an eye on BleepingComputer's news, as they will usually report when new ransomware decrypters are available:
https://www.bleepingcomputer.com/

They also have an RSS feed available:
https://www.bleepingcomputer.com/feed/

When we publish decrypters we usually announce it on our blog:
https://blog.emsisoft.com/

We also have an RSS feed:
https://blog.emsisoft.com/feed/

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    No registered users viewing this page.