Ransomware virus attack message blocking a user to access data on computer

How to Decrypt Ransomware?

My files are encrypted by ransomware, what should I do now?
First you need to calm down and avoid acting in a rash. You need to realize that your computer has been attacked by ransomware, which means that the problem is not limited to just losing encrypted files. Most likely, an active infection is still present on your computer. In all your further actions you should consider the fact that everything that you all you do on the computer, like running programs, entering credit card numbers, making calls – all this can now be intercepted by cyber-criminals.

Step 1. Remove spyware and backdoors

Now the main task is to get rid of a virus that spies on you or continues to encrypt all available files. To do this, follow the link to download GridinSoft Antimalware, and following these instructions clean your system from infection. Many users are afraid to do this because they think that all encrypted files will also be deleted along with viruses. This is not true! Encrypted files are not a virus. They will not be removed by the virus removal tool.

Once your system is clean, you can proceed to the next step – determine the type of ransomware with which you were attacked. All of them are divided into families on the basis of a principle they use. For example, such families as STOP/Djvu, Dharma, Zeppelin, Sodinokibi, Matrix and the others are widely known. Some of them have a decryption method that does not suggest turning to attackers for ransom. Others it is practically impossible to decrypt.

Step 2. Find your kind of infection

To determine the type of threat, you can use the search on our site, for example, by entering in the search extension of the files that you received as a result of infection. Or you can search by attackers e-mail, that can be usually found either in the form of a separate file, or in a folder with encrypted files. Here is an example of a search if all your files changed their extension to “.msop”:

search by name

Or an example of a search by ransomware e-mail “backdata.company@aol.com”:

search by email

If you couldn’t find the type of virus that attacked you, use this form to send us a request for review:

This is box title

    Step 3. Try to recover your data

    Now, determine the specific type of threat carefully read the article which describes in detail what you are dealing with and what are the ways to solve the problem. You should remember that the easiest way is to restore your files from a backup. Even if you think you didn’t do it, it still makes sense to check if it is there. The fact is that windows can back up on their own without notifying you.

    If no backup is found, look in the cloud storage: Google Docs, OneDrive, Apple iCloud, and others that you may have used. Quite often, people in a panic forget that they used cloud services and their files are still stored there. In case that there is no exact backup, try using the utilities specified in the infection description.

    You need to understand that if the tool indicated that it cannot help you, most likely it means that the type of virus that infects your computer appeared recently. So the developers of anti-virus solutions need time to add your case to their database. This can take either a few days or several months. Here you need to be patient. Periodically check our site for new decryption methods. We regularly update our materials and monitor the release of updates.

    We can recommend that you collect all encrypted files on a separate carrier along with a ransom note, and save them until a solution is found.

    Step 4. Reporting ransomware to authorities

    Each ransomware case carries a pile of information that may help to catch the ransomware developers and get the decryption keys from them. Local authorities who are responsible for cybercrimes investigation often get the information about new attacks only from mass-media, besides getting it directly from the victims. The recent Emotet developers arrest is the approval: this trojan virus was among the most popular ways of ransomware injection. You can read the detailed guide with the specification of data you need to make a correct report in the separate article.

    Step 5. Isolate the infected device

    After being injected in one of the computers in the network, ransomware tries to spread on the whole network, infecting all possible computers. To avoid damaging more than a single PC, remove it from the network or, if the system administrator is away, just plug out the Ethernet cable from its port. However, performing the removal/decrypting process requires a network connection, so it is recommended to use the first method.

    Be also careful while trying to perform removal/decryption actions with a help of another PC (i.e. with attaching your disk drive to someone’s computer). Several ransomware variants are able to infect the devices in such a way, so a friend of yours will not like the result. And no one knows if ransomware is able to do the same thing in the future.

    Step 6. Try to restore the files with PhotoRec

    PhotoRec is a program that is originally designed to restore the files that were deleted unintentionally. However, because of the specific ransomware encryption mechanism, you can use PhotoRec to get your files back. The virus creates a copy of each file it intends to encrypt, and then, after the successful ciphering, it substitutes the original document with the encrypted one and deletes the original variant.

    Of course, things are not so easy. The biggest possibility of getting the files back appears when you have an HDD, and the amount of time passed after the encryption is minimal. After the file is deleted from the file system, its information is still available on the physical area of the disk, and such tools as PhotoRec are able to check the disks for such remnants.

    However, because of HDD slowness, more and more people choose solid-state drives (SSD) as a storage option. And the majority of modern OS use the special command to clean the described remnants, in order to extend SSD lifespan. After this command, all file recovery tools will be useless.

    But there is nothing bad in the attempt. Below, you can see the usage guide of PhotoRec, in the text form as well as in the video.

    At first, you need to download this app. It is 100% free, but the developer states that there is no guarantee that your files will be recovered. PhotoRec is distributed in a pack with other utility of the same developer – TestDisk. The downloaded archive will have TestDisk name, but don’t worry. PhotoRec files are right inside.

    To open PhotoRec, you need to find and open “qphotorec_win.exe” file. No installation is required – this program has all the files it need inside of the archive, hence, you can fit it on your USB drive, and try to help your friend/parents/anyone who was been attacked by DJVU/STOP ransomware.

    PhotoRec file in the folder

    After the launch, you will see the screen showing you the full list of your disk spaces. However, this information is likely useless, because the required menu is placed a bit higher. Click this bar, then choose the disk which was attacked by ransomware.

    Choose the disc in PhotoRec

    After choosing the disk, you need to choose the destination folder for the recovered files. This menu is located at the lower part of the PhotoRec window. The best desicion is to export them on USB drive or any other type of removable disk.

    Choosing the destination folder of recovery

    Then, you need to specify the file formats. This option is located at the bottom, too. As it was mentioned, PhotoRec can recover the files of about 400 different formats.

    Choose the file format

    Finally, you can start files recovery by pressing the “Search” button. You will see the screen where the results of the scan and recovery are shown.

    Recovery process

    Step 7. Get a habit to create data backups

    Backups can serve you as a last hope after the ransomware attack. But there are some tough points in this thing. The most widespread versions of ransomware are able to encrypt the backups if they are stored on your computer. Better choose the cloud storage – they can offer you enough space for free to keep the old variant of the system. If you wish to keep several backups simultaneously, it is better to backup only important files – Excel tables, blueprints, photos, videos, and so on. Fit them all into the archive and upload them to the cloud. Without the system files, it will be quite small, so you will surely be able to keep several on your cloud drive.

    Sending
    User Review
    4.73 (11 votes)
    Comments Rating 0 (0 reviews)