It is believed these infections are part of a ransomware kit that different affiliates utilize with their own payment email addresses which explains all the
"@" ransomwares which have been reported.
Kaspersky Lab has a utility called
RakhniDecryptor that is able to brute force the decryption key for some of these <filename>.<extension>."@" and <filename>.<extension>.id-random number_"@"variants but
not all of them. Instructions for using RakhniDecryptor can be found
here.
Kaspersky Lab also has a
RannohDecryptor utility for decrypting some other types of these <filename>"@".<random characters> and locked-<filename>.random letters."@" variants.
There are going discussions in these related topics where you can ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.
Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in one of the above topic discussions. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion...this topic is closed.
Thanks
The BC Staff