Any files that are encrypted with Crypt0L0cker
(TorrentLocker) will have the .encrypted
extension appended to the end of the encrypted data filename and leave files (ransom notes) named DECRYPT_INSTRUCTIONS.TXT, DECRYPT_INSTRUCTIONS.HTML, INSTRUCCIONES_DESCIFRADO.HTML, How_To_Recover_Files.txt, as explained here
. The newest variant of Crypt0L0cker
appends a random 6
lower alphabetic character extension (i.e. ,pzekaq, .ixopyw, .izozyn) and leave files (ransom notes) named COMO_RESTAURAR_ARCHIVOS.txt, COMO_RESTAURAR_ARCHIVOS.html, HOW_TO_RESTORE_FILES.TXT, HOW_TO_RESTORE_FILES.HTML as noted here
and The Week in Ransomware
A repository of all current knowledge regarding Crypt0L0cker
(TorrentLocker) is provided by Grinler
(aka Lawrence Abrams), in the: TorrentLocker & Crypt0L0cker Ransomware Information Guide and FAQ
Unfortunately, there is no free decryption solution for encrypted files. However, many victims have reported that Dr.Web
was able to assist them with decrypting files...see here
Policy from Dr.Web (11/25/15): Free file decryption assistance only for PCs protected by Dr.Web at the moment of infection
If you're not a licensed user for a Dr.Web product you will have to pay for their services (Rescue Pack). Fees may vary depending on the infection and amount of data to be decrypted.
There is an ongoing discussion in this topic where victims can post comments, ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.
Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. To avoid unnecessary confusion, this topic is closed.
The BC Staff