PS5 details: Is there a risk that hackers will exploit them?
inet infosec

PS5 details: Is there a risk that hackers will exploit them?

Sony's game developer and creator, Mark Cerny, gave some details about the new PS5 console. In one...
Read More
infosec

Cisco warns of vulnerabilities in 9000 series routers

Cisco has released 31 security tips this week, but has focused users on "critical" patches for ...
Read More
infosec

HP: Adds the Sure Sense malware blocker to its new devices

HP announced a series of updates and new features for PCs, as well as the official HP release ...
Read More
infosec

Covering vacancies in hacker security

Incidents of online attacks are increasing day by day. Previously no such attention was paid. After the incident with the ...
Read More
infosec

Oracle: New Critical Patch Update fixes 297 vulnerabilities

Oracle releases a collection of patches for multiple critical security vulnerabilities. The update contains 297 new security fixes ...
Read More
Latest Posts

The victims of Planetary Ransomware can now recover their files for free

Security researchers released a decryptor that allows Planetary ransomware victims to retrieve their files for free.

ransomware

The decryptor, released by Emsisoft, asks the victim to have a copy of the ransom note that 'left' hacker. It is not difficult to find. Planetary ransomware, which earns its name for the use of planet-related file extensions, including ".Pluto" and ".Neptune," places a copy of its message in each folder where it encrypts files while doing the same thing on the desktop of infected devices.

The note tells them to contact via email with "recoverymydata@protonmail.com" or with "recoverydata @ india.com", which you will see on the screenshot below. The hackers then promise to send a decryptor as soon as the victims pay them.

Victims should download the decryptor, a link that is available from the Bleeping Computer and store it on their desktop. Then you have to run the decryptor with rights admin. This will ensure that the tool can recover all files affected by the ransomware.

As soon as they run the decryptor, they will be asked to choose a "ransom note" and click the "Start" button. The utility will then use this "ransom note" to display the decryption key used by ransomware to encrypt the victim's files. At this point, the user can enter this decryption key on the screen, select all the units that he would like to decrypt and click on the "Decrypt" button. This will cause the program to search the computer for the related file extensions used by ransomware and, in turn, to decipher them.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *