Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

attacked by ransomware CrytoLocker


  • This topic is locked This topic is locked
2 replies to this topic

#1 tom53

tom53

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:06:07 PM

Posted 04 December 2016 - 01:22 AM

Hello, 

  I been attacked by ransomware,  I think it's  CrytoLocker. 

There's a short on my desktop called CrytoLocker.  

 

My all my files are are encrypted there is a text file at the root. 

that contains: 

---------------------------------------------------------------------------------------------------------

Support e-mail: suppcop@india.com suppcop@yandex.ru
 
Your personal files encryption produced on this computer: photos, videos, documents, etc.
Encryption was produced using a unique public key RSA-2048 generated for this computer.
 
To decrypt files you need to obtain the private key.
 
The single copy of the private key, which will allow to decrypt the files,
located on a secret server on the Internet; the server will destroy the key after 120 hours.
 
After that nobody and never will be able to restore files.
 
To obtain the private key for this computer, you need pay 2.75 Bitcoin (~2040 USD)
 
---------------------------------------------------------------------------------------------------
 
Your Bitcoin address:
 
1BGNJumjrH6xGSdmJU3Wo7gPLv1xjkzMZJ
 
You must send 2.75 Bitcoin to the specified address and report it to e-mail customer support.
 
In the letter must specify your Bitcoin address to which the payment was made.
 
---------------------------------------------------------------------------------------------------
 
The most convenient tool for buying Bitcoins in our opinion is the site:
 
 
There you can buy Bitcoins in your country in any way you like, including electronic payment systems,
credit and debit cards, money orders, and others.
 
Instructions for purchasing Bitcoins on account localbitcoins.com read here:
 
 
Video tutorial detailing on buying Bitcoins using the site localbitcoins.com here:
 
 
How to withdraw Bitcoins from account localbitcoins.com to our bitcoin wallet:
 
 
Also you can use to buy Bitcoins these sites:
 
https://www.bitstamp.net/ - Big BTC exchanger
https://www.coinbase.com/ - Other big BTC exchanger
https://www.moneypakforbitcoins.us/ - Buy BTC via Green Dot MoneyPak
https://btcdirect.eu/ - Best for Europe
https://coincafe.com/ - Recommended for fast, many payment methods
https://bittylicious.com/ - Good service for Europe and World
 
---------------------------------------------------------------------------------------------
 
I to get some advice from this forum. I leaning on paying to get the private key. 
 
Thanks in advance. 
 


BC AdBot (Login to Remove)

 


#2 thyrex

thyrex

  • Members
  • 597 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Belarus
  • Local time:02:07 AM

Posted 04 December 2016 - 02:44 AM

I think that last version PClock. No way for decrypting.


Microsoft MVP 2012-2016 Consumer Security

Microsoft Reconnect 2016


#3 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,888 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:06:07 PM

Posted 04 December 2016 - 07:33 AM

The original CryptoLocker Ransomware which first appeared in the beginning of September 2013...does not exist anymore and hasn't since June 2014. There are many copycat ransomware variants which pretend to be or use the CryptoLocker name but these infections are not the same. Any references to CryptoLocker and retrieving keys for it will not work anymore.

You can submit samples of encrypted files and ransom notes to ID Ransomware for assistance with identification and confirmation. This is a service that helps identify what ransomware may have encrypted your files and then attempts to direct you to an appropriate support topic where you can seek further assistance. Uploading both encrypted files and ransom notes together provides a more positive match and helps to avoid false detections.

However, a similar report with ransom note was reported to Emsisoft in this topic a few days ago. The infection was identified as Pclock just as thyrex noted above.

Fabian explains why newer PClock variants are not decryptable in Post #987.

Just as a heads up: We released a blog post about the newest variants and why we are unable to help.

Note: ID Ransomware reports the infection as "Possible decryptable" only because the older variants are but it cannot tell the difference between old and new variants through the encrypted files or ransom note.

There is an ongoing discussion in this topic where you can post comments, ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. To avoid unnecessary confusion, this topic is closed.

Thanks
The BC Staff
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users