Quote:Continue Reading
Got infected with ransomware? Check out these free decryptors that will help you decode your data without paying the ransom
Ransomware is one of the most vicious cyber-threats out there right now. A dangerous form of malware, it encrypts files and holds them hostage in exchange for a payment.
If your network gets infected with ransomware, follow the mitigation steps below and use this list with over 190 ransomware decryption tools.
Steps to recover your data:
Step 1: Do not pay the ransom because there is no guarantee that the ransomware creators will give you access to your data.
Step 2: Find any available backups you have, and consider keeping your data backups in secure, off-site locations.
Step 3: If there are no backups, you have to try decrypting the data locked by ransomware using these ransomware decryptors.
Navigate through these links to learn more.How to identify the ransomware you’ve been infected with
- How to identify the ransomware you’ve been infected with
- Ransomware decryption tools
- Ransomware families vs tools for decryption
- How to avoid ransomware in the future
- Quick checklist for ransomware protection
Oftentimes, the ransom note provides details about the type of ransomware your files have been encrypted with, but it can happen that you don’t have this information at hand. Readers have asked us to show which encryption extensions belong to which ransomware families. Many of these extensions signaled new types of encrypting malware, for which there are no ransom decryptors available.
If you need help with identifying what type of ransomware is affecting your system so that you know what decryption tools to use, one of the two options below can help you out:
Crypto Sheriff from No More RansomID Ransomware from MalwareHunter Team
Ransomware decryption tools – an ongoing listDisclaimer:
You should know that the list below is not complete and it will probably never be. Use it, but do a documented research as well. Safely decrypting your data can be a nerve-wracking process, so try to be as thorough as possible.
We’ll do our best to keep this list up to date and add more tools to it.
Contributions and suggestions are more than welcome, as we promise to promptly follow up on them and include them on the list.
Some of the ransomware decryption tools mentioned below are easy to use, while others require a bit more tech knowledge to decipher. If you don’t have technical skills, you can always ask for help on one of these malware removal forums, which feature tons of information and helpful communities.
Ransomware families vs ransomware decryption tools
- .777 ransomware decrypting tool
- 7even-HONE$T decrypting tool
- .8lock8 ransomware decrypting tool + explanations
- 7ev3n decrypting tool
- AES_NI Rakhni Decryptor tool
- Agent.iih decrypting tool (decrypted by the Rakhni Decryptor)
- Alcatraz Ransom decryptor tool
- Alma ransomware decryption tool
- Al-Namrood decrypting tool
- Alpha decrypting tool
- AlphaLocker decrypting tool
- Amnesia Ransom decryptor tool
- Amnesia Ransom 2 decryptor tool
- Anabelle Ransom decryptor tool
- Apocalypse decrypting tool
- ApocalypseVM decrypting tool + alternative
- Aura decrypting tool (decrypted by the Rakhni Decryptor)
- AutoIT decrypting tool (decrypted by the Rannoh Decryptor)
- AutoLT decrypting tool (decrypted by the Rannoh Decryptor)
- Autolocky decrypting tool
- Avaddon ransom decryption tool
- Avest ransom decryption tool
- Badblock decrypting tool + alternative 1
- BarRax Ransom decryption tool
- Bart decrypting tool
- BigBobRoss decrypting tool
- BitCryptor decrypting tool
- Bitman ransomware versions 2 & 3 (decrypted by the Rakhni Decryptor)
- BitStak decrypting tool
- BTCWare Ransom decryptor
- Cerber decryption tool
- Chimera decrypting tool + alternative 1 + alternative 2
- CheckMail7 ransomware decryption tool
- ChernoLocker ransom decryption tool
- CoinVault decrypting tool
- Cry128 decrypting tool
- Cry9 Ransom decrypting tool
- Cryakl decrypting tool (decrypted by the Rannoh Decryptor)
- Crybola decrypting tool (decrypted by the Rannoh Decryptor)
- CrypBoss ransomware decrypting tool
- CryCryptor ransomware decrypting tool
- Crypren ransomware decrypting tool
- Crypt38 ransomware decrypting tool
- Crypt888 (see also Mircop) decrypting tool
- CryptInfinite decrypting tool
- CryptoDefense decrypting tool
- CryptFile2 decrypting tool (decrypted by the CryptoMix Decryptor)
- CryptoHost (a.k.a. Manamecrypt) decrypting tool
- Cryptokluchen decrypting tool (decrypted by the Rakhni Decryptor)
- CryptoMix Ransom decrypting tool + offline alternative
- CryptON decryption tool
- CryptoTorLocker decrypting tool
- CryptXXX decrypting tool
- CrySIS decrypting tool (decrypted by the Rakhni Decryptor – additional details)
- CTB-Locker Web decrypting tool
- CuteRansomware decrypting tool (decrypted by the my-Little-Ransomware Decryptor)
- Cyborg ransomware decryption tool
- Damage ransom decrypting tool
- Darkside ransomware decryption tool
- DemoTool decrypting tool
- Dharma Ransom Rakhni decryptor tool
- DeCrypt Protect decrypting tool
- Democry decrypting tool (decrypted by the Rakhni Decryptor)
- Derialock ransom decryptor tool
- Dharma Decryptor
- DMA Locker decrypting tool + DMA2 Locker decoding tool
- DragonCyber ransomware decryption tool
- DXXD ransomware decryption tool
- Encryptile decrypting tool
- ElvisPresley ransomware decryption tool (decrypted by the Jigsaw Decryptor)
- Everbe Ransomware decrypting tool
- Fabiansomware decrypting tool
- FenixLocker – decrypting tool
- FilesLocker decrypting tool
- FindZip decrypting tool
- FortuneCrypt decrypting tool (decrypted by the Rakhni Decryptor)
- Fonix ransomware decryption tool
- Fury decrypting tool (decrypted by the Rannoh Decryptor)
- GalactiCryper ransom decryptor
- GandCrab decrypting tool
- GetCrypt decryption tool
- GhostCrypt decrypting tool
- Globe / Purge decrypting tool + alternative
- Globe2 decryption tool
- Globe3 decryption tool
- GlobeImpostor decryption tool
- Gomasom decrypting tool
- GoGoogle decryption tool
- Hacked decrypting tool
- Hakbit decryptor
- Harasom decrypting tool
- HydraCrypt decrypting tool
- HiddenTear decrypting tool
- HildraCrypt decryptor
- HKCrypt ransom decryptor
- Iams00rry decryptor
- InsaneCrypt ransomware decryptor
- Iwanttits ransomware decryptor
- Jaff decrypter tool
- JavaLocker decryptor
- Jigsaw/CryptoHit decrypting tool + alternative
- JS WORM 2.0 decryptor
- JS WORM 4.0 decryptor
- Judge ransomware decryptor
- KeRanger decrypting tool
- KeyBTC decrypting tool
- KimcilWare decrypting tool
- KokoKrypt decryptor
- Lamer decrypting tool (decrypted by the Rakhni Decryptor)
- LambdaLocker decryption tool
- LeChiffre decrypting tool + alternative
- Legion decrypting tool
- Linux.Encoder decrypting tool
- Lobzik decrypting tool (decrypted by the Rakhni Decryptor)
- Lock Screen ransomware decrypting tool
- Locker decrypting tool
- Loocipher decryptor
- Lorenz ransomware decryptor
- Lortok decrypting tool (decrypted by the Rakhni Decryptor)
- MacRansom decrypting tool
- Magniber decryptor
- MaMoCrypt ransomware decryption tool
- Mapo ransomware decryptor
- Marlboro ransom decryption tool
- MarsJoke decryption tool
- Manamecrypt decrypting tool (a.k.a. CryptoHost)
- Mircop decrypting tool + alternative
- Mira ransom decryptor
- MegaLocker ransomware decrypting tool
- Merry Christmas / MRCR decryptor
- Mole decryptor tool
- MoneroPay Ransomware decrypting tool
- muhstik ransomware decryptor
- my-Little-Ransomware decrypting tool
- Nanolocker decrypting tool
- Nemty ransomware decryptor
- Nemucod decrypting tool + alternative
- NMoreira ransomware decryption tool
- Noobcrypt decryption tool
- ODCODC decrypting tool
- OpenToYou decryption tools
- Operation Global III Ransomware decrypting tool
- Ouroboros ransomware decryptor
- Ozozalocker ransomware decryptor
- Paradise ransomware decryptor
- PClock decrypting tool
- Petya decrypting tool + alternative
- PewCrypt ransom decryptor
- Philadelphia decrypting tool
- PizzaCrypts decrypting tool
- Planetary ransomware decrypting tool
- Pletor decrypting tool (decrypted by the Rakhni Decryptor)
- Polyglot decrypting tool (decrypted by the Rannoh Decryptor)
- Pompous decrypting tool
- PowerWare / PoshCoder decrypting tool
- Popcorn Ransom decrypting tool
- Professeur ransomware decryptor (decrypted by the Jigsaw Decryptor)
- PyLocky Ransomware decrypting tool
- Radamant decrypting tool
- RAGNAROK decrypting tool
- Rakhni decrypting tool
- Rannoh decrypting tool
- Ransomwared decryptor
- Rector decrypting tool
- RedRum ransomware decryptor
- Rotor decrypting tool (decrypted by the Rakhni Decryptor)
- Scraper decrypting tool
- SimpleLocker ransomware decryptor
- Simplocker ransomware decryptor
- Shade / Troldesh decrypting tool + alternative
- SNSLocker decrypting tool
- SpartCrypt decryptor
- Stampado decrypting tool + alternative
- STOP Djvu Ransomware decryptor
- SynAck ransom decryptor
- Syrk ransomware decryptor
- SZFlocker decrypting tool
- Teamxrat / Xpan decryption tool
- TeleCrypt decrypting tool (additional details)
- TeslaCrypt decrypting tool + alternative 1 + alternative 2
- Thanatos decryption tool
- ThunderX decryptor
- Trustezeb.A decryptor
- TurkStatic Decryptor
- TorrentLocker decrypting tool
- Umbrecrypt decrypting tool
- VCRYPTOR Decryptor
- Wildfire decrypting tool + alternative
- WannaCry decryption tool + Guide
- WannaRen decryption tool
- XData Ransom decryption tool
- XORBAT decrypting tool
- XORIST decrypting tool + alternative
- Yatron decrypting tool (decrypted by the Rakhni Decryptor)
- ZeroFucks decryptor
- Zeta decrypting tool (decrypted by the CryptoMix Decryptor)
- Ziggy ransomware decryptor
- Zorab ransomware decryptor
- ZQ ransomware decryptor
As you may have noticed, some of these ransomware decryptors work for multiple ransomware families, while certain strains have more than one solution (although this is rarely the case).
From a practical perspective, some of the decryptors are easy to use, but some require some technical know-how. As much as we’d want this process to be easier, it doesn’t always happen.
No matter how much work and time researchers put into reverse engineering cryptoware, the truth is that we’ll never have a solution to all of these infections. It would take an army of cybersecurity specialists working around the clock to get something like this done.
...
Users browsing this thread: 1 Guest(s) |
![]() |
![]() |