Any files that are encrypted with Crypt0L0cker
(TorrentLocker) will have the .encrypted
extension appended to the end of the affected filename. Crypt0L0cker will leave files (ransom notes) with names like DECRYPT_INSTRUCTIONS.TXT, DECRYPT_INSTRUCTIONS.HTML, INSTRUCCIONES_DESCIFRADO.HTML, and How_To_Recover_Files.txt, How_To_Restore_Files.txt.
A repository of all current knowledge regarding Crypt0L0cker
(TorrentLocker) is provided by Grinler
(aka Lawrence Abrams), in this topic: TorrentLocker (fake CryptoLocker) Ransomware Information Guide and FAQ
Unfortunately, decryption of Crypt0L0cker (TorrentLocker)...is impossible
since there is no way to retrieve the private key that can be used to decrypt your files without paying the ransom. The only methods you have of restoring your files is from backup, file recovery software, or from Shadow Volume Copies as explained in the FAQ: How to restore files encrypted by TorrentLocker
...but there is no guarantee that will work.
However, you may want to read this BC News article: Dr.Web quietly decrypting TorrentLocker for paid customers or distributors
Updated policy from Dr.Web (11/25/15): Free file decryption assistance only for PCs protected by Dr.Web at the moment of infection
As with most ransomware infections...the best solution for dealing with encrypted data is to restore from backups
. If that is not a viable option, the only other alternative is to save your data as is and wait for a possible breakthrough
...meaning, what seems like an impossibility at the moment (decryption of your data), there is always hope someday there may be a potential solution so save the encrypted data and wait until that time.
There are ongoing discussions in these topics where you can ask questions and seek further assistance.
Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that support topic discussion. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion...this topic is closed.
The BC Staff