Amazing news for anyone whose computer was affected by CryptoLocker! The long-awaited service for decrypting files held hostage by CryptoLocker is available. The solution comes shortly after Kyrus Technology researchers released a post with comprehensive details on how CryptoLocker works. Their post also contains information on how they impressively reverse engineered the process in order to obtain the key utilized to encrypt thousands of files.
Dell SecureWorks first discovered the CryptoLocker Trojan 3 years ago. CryptoLocker works by encrypting files, which have precise file extensions, and decrypting them once a $300 ransom has been paid. Even though the network, which served the Trojan, was ultimately taken down, countless users remain separated from their files — until the way out was discovered.
Are you a victim of CryptoLocker? Do you want to know how to get your files effortlessly back? Read on …
The CryptoLocker Trojan: Let’s Recap
When CryptoLocker first burst into the scene, most tech nerds described it as the ‘nastiest malware of all time.’ Once the malware gets on your system, it seizes your files with a next-to-impossible to break encryption. What is more is that you will be charged a fortune to obtain your files back.
The malware did not just attack local hard drives. It also harmed mapped network drive that is connected to an infected computer or an external hard drive. The attacks caused havoc in businesses where employees normally collaborate and share docs on a network attached storage drive (s).
How The Cryptolocker Reversal Was Done
After Kyrus Technologies successfully performed the CryptoLocker reverse engineering, the next thing they did was to create a decryption engine. Files that are encrypted with CryptoLocker malware normally follow a certain format. Every encrypted file is conducted using an AES-256 key, which is unique to the specific file. The information together with an understanding of file format utilized to store encrypted files enabled Kyrus Technologies to develop a highly effective decryption tool.
How To Decrypt Cryptolocker Infected Hard Drives
The first thing you need to do is to visit decryptolocker.com. You will need a sample file that is encrypted with CryptoLocker malware to hand. After doing these two things, here are the steps you need to follow in order to recover files from CryptoLocker for free:
l Identify one CryptoLocker-encrypted document that you believe does not have sensitive data. After finding it, upload it to DecryptoLocker portal. This service works perfectly on files that contain sensitive information.
l Be patient and you wait to receive a private key from the DecryptoLocker portal. You will also get a link where you can download and then install a decryption tool, that can operate locally on a computer.
l Run the decryption tool locally on your computer utilizing the private key provided. The process will decrypt all the encrypted files present in the hard drive.
Sadly, a number of new CryptoLocker variants continue to circulate. As much as they operate in the same fashion to the CryptoLocker Trojan, a strategy to fix them is not yet available. The good news is that with technology, nothing is impossible. It is only a matter of time before an effective and long term solution becomes available.