Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


New GlobalImposter varient? .f1crpyt

  • This topic is locked This topic is locked
2 replies to this topic

#1 skyhigh00


  • Members
  • 1 posts
  • Local time:12:56 PM

Posted 01 September 2017 - 11:05 AM

Got a situation where were a computer was infected with ransomware which encrypted some shared drives. The infected computer itself was wiped by someone before I could determine the name of the file doing the encryption. The files encrypted retain their filenames but the extension is now ".f1crypt". ID Ransomware states its GlobeImposter 2.0, but after doing some research, I was unable to find any information regarding this particular extension type. Ideally, I would hope there's a decryptor but I am not holding my breathe. We have some cloud backups, but not all since some files were unable to be backed up due to it occurring before the backup kicked in. If anyone can provide any insight on this, I would greatly appreciate it.


Edit: Typos

Edited by skyhigh00, 01 September 2017 - 11:07 AM.

BC AdBot (Login to Remove)


#2 Demonslay335


    Ransomware Hunter

  • Security Colleague
  • 3,565 posts
  • Gender:Male
  • Location:USA
  • Local time:11:56 AM

Posted 01 September 2017 - 12:46 PM

All versions of GlobeImposter 2.0 are the same. It's a builder that the criminals can customize once they purchase it. It is secure and fixed the flaws that allowed the first version of it to be decrypted. Restoring from backups is your only option aside from paying the ransom.

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.

#3 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,773 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:56 PM

Posted 01 September 2017 - 02:14 PM

Since the infection has been identified, rather than have everyone with individual topics, it would be best (and more manageable for staff) if victims posted any more questions, comments or requests for assistance in the below support topic discussion.To avoid unnecessary confusion, this topic is closed.

The BC Staff
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users