Asif

The file has been encrypted with ZOBM extension

Recommended Posts

Hello , 

I have tried all method you guys have mentioned unfortunately did not work . 

Please help to release some update how to decrypt files from my laptop. 

 

Regards,

Thanks

Asif

Share this post


Link to post
Share on other sites
Just now, noah said:

I believe the keys can be generated from using both an original copy and the ecrypted copy  samples

That's not possible with AES encryption.

Share this post


Link to post
Share on other sites
22 hours ago, md Khaleel said:

my system faceing same issuse all file are .ZOBM extension how to fix it

This is a newer variant of STOP/Djvu. If you have an offline ID, then once we can find the decryption key for this variant and add it to our database you will be able to recover your files. However, if you have an online ID (which is more likely) then it will not be possible to recover your files. There is more information at the following link:
https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/

Share this post


Link to post
Share on other sites
8 hours ago, GT500 said:

This is a newer variant of STOP/Djvu. If you have an offline ID, then once we can find the decryption key for this variant and add it to our database you will be able to recover your files. However, if you have an online ID (which is more likely) then it will not be possible to recover your files. There is more information at the following link:
https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/

My id is 0186Asd374y5iuhldocztalE91iFsQ81Xle5IWUcTeXa51UXhqAFcNYJT  is it online or offline?

Share this post


Link to post
Share on other sites
9 hours ago, _lokesh_singh_ said:

My id is 0186Asd374y5iuhldocztalE91iFsQ81Xle5IWUcTeXa51UXhqAFcNYJT  is it online or offline?

That's an online ID.

Share this post


Link to post
Share on other sites

Offline public keys are embedded into the ransomware itself for use in encryption.

Offline private keys can be found in decrypters sent by the criminals to those with offline ID's who have paid the ransom. The decrypters are only available to us when the victims with offline ID's who have paid the ransom send them to us. Once we have an offline private key, we add it to our database so that our decrypter can use it.

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    No registered users viewing this page.