A repository of all current knowledge regarding CTB Locker and Critroni Ransomware
is provided by Grinler
(aka Lawrence Abrams
), in this tutorial: CTB Locker and Critroni Ransomware Information Guide and FAQ
Reading that Guide will help you understand what CTB Locker (Critroni) does and provide information for how to deal with it. The newest variants of CTB Locker typically encrypt all data files and rename them as a file with a 6-7 length extension with random characters
. The newer variants also do not always leave a ransom note if the malware fails to change the background, like it generally does. You can check your documents folder for an image the malware normally uses...it may be labeled "decryptallfiles" or something similar. At this time there is no fix tool and no way to retrieve the private key that can be used to decrypt your files without paying the ransom.
More information in this article: New Critroni variant offers free test decryption and now uses CTB2 extension
. Unfortunately, there is still no known method of decrypting your files without paying the ransom.
There is also an ongoing discussion in this topic: CTB Locker or DecryptAllFiles.txt Encrypting Ransomware Support & Discussion
. Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.
The BC Staff