McAfee: Mounted former employees for leaking data to an opponent
infosec

McAfee: Mounted former employees for leaking data to an opponent

McAfee has sued three of her former employees, who, as they say, have stolen commercial secrets from the company to transport them ...
Read More
infosec

Six people were arrested by Europol for Bitcoin theft

According to a press release released on June 25, Europol in partnership with South West Regional Cyber ​​...
Read More
infosec

Why can not I remove Windows 7? But why should it?

As we have mentioned several times in the past, Microsoft is particularly concerned about the world's love for Windows ...
Read More
infosec

Phishing campaign infects Windows computers with two types of trojan

A new phishing campaign infects the victims with two popular trojan and hackers seem to try to target ...
Read More
infosec

Bank Trojan Riltok has also begun to locate itself in Europe

Riltok, a banking Trojan known for its activity in entities in Russia, seems to have been renewed and now has ...
Read More
Latest Posts

The victims of Planetary Ransomware can now recover their files for free

Security researchers released a decryptor that allows Planetary ransomware victims to retrieve their files for free.

ransomware

The decryptor, released by Emsisoft, asks the victim to have a copy of the ransom note that 'left' hacker. It is not difficult to find. Planetary ransomware, which earns its name for the use of planet-related file extensions, including ".Pluto" and ".Neptune," places a copy of its message in each folder where it encrypts files while doing the same thing on the desktop of infected devices.

The note tells them to contact via email with "recoverymydata@protonmail.com" or with "recoverydata @ india.com", which you will see on the screenshot below. The hackers then promise to send a decryptor as soon as the victims pay them.

Victims should download the decryptor, a link that is available from the Bleeping Computer and store it on their desktop. Then you have to run the decryptor with rights admin. This will ensure that the tool can recover all files affected by the ransomware.

As soon as they run the decryptor, they will be asked to choose a "ransom note" and click the "Start" button. The utility will then use this "ransom note" to display the decryption key used by ransomware to encrypt the victim's files. At this point, the user can enter this decryption key on the screen, select all the units that he would like to decrypt and click on the "Decrypt" button. This will cause the program to search the computer for the related file extensions used by ransomware and, in turn, to decipher them.

Share
Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *