It is believed these infections are part of a ransomware kit that different affiliates utilize with their own payment email addresses which explains all the "@" ransomwares which have been reported.Kaspersky Lab
has a utility called RakhniDecryptor
that is able to brute force the decryption key for some of these <filename>.<extension>."@" and <filename>.<extension>.id-random number_"@"variants but not all
of them. Instructions for using RakhniDecryptor can be found here
also has a RannohDecryptor utility for decrypting
some other types of these <file name>"@".<random characters> and locked-<file name>.random letters."@" variants.
There are going discussions in these related topics where you can ask questions and seek further assistance.
Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in one of the above topic discussions. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion...this topic is closed.
The BC Staff