............ Have a nice day............

Wednesday 6 August 2014

CryptoLocker Decryption Tool released

There is some good news for those victims whose files have been locked by the Crytpolocker ransomware. Victims can now use the free CryptoLocker Decryption Tool from FireEye and Fox-IT to decrypt the Cryptolocker encrypted files. This Cryptolocker removal tool might just help you your data back!
CryptoLocker Decryption Tool CryptoLocker Decryption Tool released
CryptoLocker targets internet users – especially users of Microsoft Windows. It could infect PC’s using various sources, the most common being a legitimate email attachment. While there were ways you could prevent Cryptolocker ransomwareby taking a few steps, there was no real way to get your files back, if your PC did become infected. The only way for the victim then, was to pay the ransom money – typically around USD 300 – and get the ‘key’ to decrypt the encrypted files.

CryptoLocker Decryption Tool

However, researchers at FireEye and Fox-IT have now come together and released a free tool that will decrypt the Cryptolocker encrypted files. To use this tool, you will have to upload any single encrypted file to their server. After it identifies the key to decrypt the file, the tool will then be able to decrypt all the other files on your PC.
The user can upload an encrypted CryptoLocker file.  Based on this upload, the user will be provided with the option to download a private key that should decrypt their affected files. The site also provides instructions on how to apply this key to the files encrypted by CryptoLocker to decrypt those files.
It is however pertinent to note that the encryption algorithm itself has still not been cracked. What the tool does is, use the database of the RSA private keys that was obtained during the recent takedown of the GameOver Zeus botnet, and use it.
Visit decryptcryptolocker.com if you have been a victim of the Cryptolocker ransomware, to decrypt your encrypted filed. You can get more details about the procedure here.

No comments:

Post a Comment