Jump to content
Posted 02 February 2018 - 11:57 AM
Posted 01 May 2018 - 05:48 PM
Still wanted to check if there's any progress or updates on this type of ransomware. Is there any possible developments, or just waiting for authorities or the ransomware to hand the keys over? Is it specific to a certain variant of CrypMic type ransomware? I'm still holding out hope that my laptop could have salvaged. I'd give anything a shot, and since its been 2 years since I got infected, I doubt that the authors of this version are still taking payment.
I'm worried that a variant like CrypMic will just fade into history, and it will be forgotten. So any encouraging ideas would be greatly appreciated. I'd pay more than what the original ransom was, haha.
Posted 01 May 2018 - 06:45 PM
Posted 02 May 2018 - 04:03 AM
Law enforcement authorities (agencies) could find and arresting any extortionist if they could wanted to. But the fact is that usually law enforcement agencies protect those who came to power and those who hold this power, who manipulate this power, and this is those one who benefits from the current law, which is strict only to the ordinary people.
Therefore, you do not need to be under the delusion that the police will catch extortionists somewhere. They will not be caught until the extortionists begin to extort money from those who have power.
In history, there are cases when the extortionists themselves or their competitors, or their former partners, or other extortionists who hacked the base of competitors, published decryption keys. And then there was no merit of law enforcement authorities and agencies.
Edited by Amigo-A, 02 May 2018 - 04:49 AM.
Have you been attacked by a Ransomware? Report here. Знаете русский язык? Пишите мне на русском. Помогу.
Posted 11 May 2018 - 11:36 AM
Sorry to say but there has been no progress with decrypting files encrypted by CrypMIC without paying the ransom that I am aware of.
Law enforcement authorities have had some success arresting cyber-criminals, seizing C2 servers and releasing private RSA decryption keys to the public but the criminals behind CrypMIC have probably moved on or went into hiding. But you never know...at some point they could get caught or even choose to release the master keys.
For now all you can do is keep your saved data and continue to wait.
Is there ever any "other" or less known ways that ransomware is ever decrypted? I'm willing to try anything, as this has been a hassle for the last two years, and I don't want to lose hope that one day I'll get all my personal files and pictures back.
Posted 11 May 2018 - 04:49 PM
Posted 15 June 2018 - 11:48 AM
Is it possible for Crypmic to have a brute force program like Everbe Ransomware to look up the key for comparing the encrypted and decrypted file?
Posted 15 June 2018 - 05:52 PM
Dr.Web: Encryption ransomware - Threat No. 1
Dr.Web statistics show that the probability of restoring files compromised by encryption ransomware doesn't exceed 10%.
0 members, 0 guests, 0 anonymous users