Batu69 Posted April 28, 2016 Share Posted April 28, 2016 Rannoh, CryptXXX, Crybola, Cryakl – these are all the names of the dreaded ransomware that can infect your Windows PC and demand a ransom for decrypting your own files that the malware has intentionally encrypted. For many of the home users, the infection by these ransomware means that the personal files like family videos, vacation pictures, personal documents etc., become encrypted. And if any of these ransomware infects a business PC then it could mean loss of important documents, that is, unless you pony up your hard earned money to the cyber criminals. Fortunately, you do not have to pay anything to those crooks. You can just a tool created by the Kaspersky Labs called RannohDecryptor that is able to decrypt the files encrypted by the ransomware belonging to the families Rannoh, Fury, Crybola, Cryakl or CryptXXX. After launching the RannohDecryptor, you can click on the Start Scan button and then choose the encrypted files. The tool will try to decrypt the files automatically and it works most of the time. But sometimes it is not able to decrypt the files and asks for a copy of the original file. In such cases, all you need the original copy of just one of the files. The Kaspersky tool can determine the encryption used by the ransomware by comparing the original file and the encrypted file. After this, it will decrypt all of the encrypted files easily. If your PC is hit by a ransomware and you have to use a tool like Kaspersky RannohDecryptor for decrypting the files, then you should also consider protecting your PC with a security product like Kaspersky Antivirus or Kaspersky Internet Security for full and complete protection from malware in the future. Kaspersky RannohDecryptor tool Article source Link to comment Share on other sites More sharing options...
ASIO Posted April 28, 2016 Share Posted April 28, 2016 ransomware = Nightmare thanks to kaspersky Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.