Decrypt infected files from DecryptorMax without ransom payment

Fabian Wosar of Emisoft has been able to develop a tool that is capable of decoding files encrypted by DecryptorMax ransomware, also known as CryptInfinite.decrypt cryptinfinite DecryptorMax

Infection occurs when victims open a Word document and enable macros to view the file properly. Word macros are a known security issue used by many developers software to distribute malware to Windows computers.

Έτσι αν το ransomware εγκατασταθεί στον υπολογιστή του θύματος, αρχίζει αμέσως την των αρχείων που συναντά μπροστά του, προσθέτοντας την επέκταση .crinf σε όλα τα κατεστραμμένα αρχεία.

Immediately after the Ransom informs the user that they have 24 hours to send them via PayPal or MyCash to one of three email addresses: silasw9pa[at]yahoo.co.uk, decryptor171[at]mail2tor.com and decryptor171[at]scramble.io.

In addition, the ransomware changes the desktop wallpaper with a ransom note, then deletes all of Volume Shadow, and disables the Windows startup repair function so that the victim cannot restore previous backups.

Here comes the Wosar tool, called DecryptInfinite, and is quite easy to use. It will allow you (if you are affected by DecryptorMax) to unlock your files without paying the ransom.

The tool will calculate the decryption key needed to decrypt the files. Of course, this is a time-consuming one , and you will need to arm yourself with patience, to use DecryptInfinite.

More details on how to use DecryptInfinite and how the tool works, you can find the forum to find a topic of its forum Bleeping Computer.

Download the tool

http://emsi.at/DecryptCryptInfinite

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).