Anti-Ransomware Portal

BoraMurdar

Community Manager
Thread author
Verified
Staff Member
Well-known
Aug 30, 2012
6,598
The Dutch National Police, Europol, Intel Security, and Kaspersky Lab joined forces today and announced the launch of No More Ransom, a Web portal that aggregates official information regarding ransomware, its mode of operation, and ways to fight it.

Accessible at nomoreransom.org, the portal contains a basic Q&A about how ransomware works, advice to prevent ransomware infections, and links where ransomware victims can report the infection (crime) to the appropriate agency in the EU and the US.

Shade ransomware decrypter available
The portal's Decryption Tools section will probably be the most visited page on the site, because users will find here decrypters for various ransomware families that can unlock their files without paying the ransom.

Currently, the page features decrypters for ransomware families such as CoinVault, Rannoh, AutoIt, Fury, Crybola, Cryakl, CryptXXX (v1 and v2), Rakhni, Agent.iih, Aura, Pletor, Rotor, Lamer, Lortok, Cryptokluchen, and Democry.

The latest addition to this list is the Shade (Troldesh) ransomware, for which Europol said they were able to seize the C&C servers, recover encryption keys, and use them to create a free decrypter. According to Microsoft, Shade is last month's tenth ranked ransomware in terms of activity.

A ransomware identification service that still needs some work
Another page, called Crypto Sheriff, also allows users to upload two encrypted files and the ransom note (or the ransom note's text), which would immediately tell victims with what type of ransomware they have been infected.

Once Crypto Sheriff identifies the threat, it will automatically provide a link to the decrypter.

The concept behind Crypto Sheriff is identical to the ID-Ransomware service created by Michael Gillespie, which at this point has become a mammoth project, capable of recognizing 145 ransomware families at the time of writing.

Unfortunately, after a few tests, Crypto Sheriff was not able to identify different types of ransomware such as Jigsaw, AMBA, or TeslaCrypt v3 and v4. The service looks like it still needs some work, so if nothing shows up, make sure to visit ID-Ransomware as well.

Anyhow, the portal is a step in the right direction, a sign that authorities are starting to notice this epidemic that has grown five times in the period of 2015-2016, compared to 2014-2015.

europol-kaspersky-intel-get-together-to-create-anti-ransomware-portal-506611-3.png
 

encikarel

New Member
Jul 27, 2016
2
I think Trendmicro just updated (29thJuly) the Decryptor tool that supports below #ransomware. My PC is infected with latest ransomware CryptXXX V4 since last Tuesday. Right now, I'm trying this tool since this tool just supported the CrpytXXX V4. Hopefully it works to recover all my files.


Using the Trend Micro Ransomware File Decryptor Tool


Ransomware File name and extension
CryptXXX V1, V2, V3* {original file name}.crypt, cryp1, crypz, or 5 hexadecimal characters
CryptXXX V4, V5 {MD5 Hash}.5 hexadecimal characters
TeslaCrypt V1** {original file name}.ECC
TeslaCrypt V2** {original file name}.VVV, CCC, ZZZ, AAA, ABC, XYZ
TeslaCrypt V3 {original file name}.XXX or TTT or MP3 or MICRO
TeslaCrypt V4 File name and extension are unchanged
SNSLocker {Original file name}.RSNSLocked
AutoLocky {Original file name}.locky
BadBlock {Original file name}
777 {Original file name}.777
XORIST {Original file name}.xorist or random extension
XORBAT {Original file name}.crypted
CERBER {10 random characters}.cerber
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top