Hopefully, you do not know this joy. But the victim of an encryption Trojan could embrace the world, if you find a Tool that your data will return. That could change now.
Hanover (dpa/tmn) – Has encrypted Ransomware, all of the data on the computer and demands a ransom, is good advice expensive. One thing you should not do anyway, even if it is within close proximity of A search engine with the name of the encrypting gung Trojan feed in the hope that a decryption program.
Because then it pushes more recently, on Tools, which pretend to decrypt Ransomware encrypted data. In fact, you encrypt the data, but, once again, warns the specialist portal “Heise online”.
“Decrytper Djvu” makes things worse
Currently, the Fake-decryptor “Decrypter Djvu was” in circulation, claiming to want to Sacrifice the Ramsomware “Stop Djvu” help. However, behind the Tool developers to make the Trojan Zorab. And who is running it, starts Zorab. This encrypts the data again and calls for its part, ransom. Under the prank, the victim is asked twice to the cashier.
Who is looking at encrypted data should only trust reputable sources – for example, the “ID Ransomware”-a project that can detect, on the basis of a high-loaded sample file often, what encryption Trojan is exactly.
Europol-project collects decryptor
to know This is important, if you want to make on the search for a cure. One of the most trusted archives trusted, the decryptor Tools, including instructions on gathers, it is ” No more Ransom.” It is operated among others by Europol and IT Security companies.
The police advise Users, in principle, not to let the blackmailer of malicious software intimidate you. Victims should not pay any money to the perpetrators, but to make a complaint. Even in the case of a ransom payment, there is no guarantee that you can restore its data and then permanently again.
Encrypted never
Of Ransomware encrypted files delete you should not delete it on principle. Finally, it is always possible that the right Tools for the decryption are published. The best protection against extortion through Ransomware-makers, according to the experts, the regular Backup of all or at least the most important files on external data.
“ID Ransomware” to Determine the Ransomware
“No more Ransom”-archive for the decryption tools
report of the “Heise online”