Any files that are encrypted with
Crypt0L0cker (TorrentLocker) will have the
.encrypted or
.enc extension appended to the end of the encrypted data filename and leave files (ransom notes) named DECRYPT_INSTRUCTIONS.TXT, DECRYPT_INSTRUCTIONS.HTML, INSTRUCCIONES_DESCIFRADO.HTML, How_To_Recover_Files.txt, as explained
here. The newest variant of
Crypt0L0cker appends a random
6 lower alphabetic character extension (i.e. ,pzekaq, .ixopyw, .izozyn) and leave files (ransom notes) named COMO_RESTAURAR_ARCHIVOS.txt, COMO_RESTAURAR_ARCHIVOS.html, HOW_TO_RESTORE_FILES.TXT, HOW_TO_RESTORE_FILES.HTML as noted
here and
The Week in Ransomware.
A repository of all current knowledge regarding
Crypt0L0cker (TorrentLocker) is provided by
Grinler (aka Lawrence Abrams), in the:
TorrentLocker & Crypt0L0cker Ransomware Information Guide and FAQUnfortunately, there is no free decryption solution for encrypted files. However, many victims have reported that
Dr.Web was able to assist them with decrypting files...see
here.
Policy from Dr.Web (11/25/15):
Free file decryption assistance only for PCs protected by Dr.Web at the moment of infectionIf you're not a licensed user for a Dr.Web product you will have to pay for their services (Rescue Pack). Fees may vary depending on the infection and amount of data to be decrypted.
There is an ongoing discussion in this topic where victims can post comments, ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.
Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. To avoid unnecessary confusion, this topic is closed.
Thanks
The BC Staff