Eventually Fabian Wosar, a leading malware analyst Emsisoft, managed to release one Decrypter για μια νέα παραλλαγή ransomware που ονομάζεται aUTOLOCK.
AutoLocky mimics one of the most famous and dangerous Locky ransomware that appeared at the beginning of 2016.
The malware κρυπτογραφεί αρχεία του υπολογιστή του θύματος και απαιτεί λύτρα για την αποκρυπτογράφησή τους.
Below is a list of 217 file types encrypted by AutoLocky:
docm,docx,dot,doc,txt,xls,xlsx,xlsm,7z,zip,rar,jpeg,jpg,bmp,pdf,ppsm,ppsx,ppam,potm,potx,pptm,pptx,pps,pot,ppt,xlw,xll,xlam,xla,xlsb,xltm,xltx,xlm,xlt,xml,dotm,dotx,odf,std,sxd,otg,sti,sxi,otp,odg,odp,stc,sxc,ots,ods,sxg,stw,sxw,odm,oth,ott,odt,odb,csv,rtf,accdr,accdt,accde,accdb,sldm,sldx,drf,blend,apj,3ds,dwg,sda,ps,pat,fxg,fhd,fh,dxb,drw,design,ddrw,ddoc,dcs,wb2,psd,p7c,p7b,p12,pfx,pem,crt,cer,der,pl,py,lua,css,js,asp,php,incpas,asm,hpp,h,cpp,c,csl,csh,cpi,cgm,cdx,cdrw,cdr6,cdr5,cdr4,cdr3,cdr,awg,ait,ai,agd1,ycbcra,x3f,stx,st8,st7,st6,st5,st4,srw,srf,sr2,sd1,sd0,rwz,rwl,rw2,raw,raf,ra2,ptx,pef,pcd,orf,nwb,nrw,nop,nef,ndd,mrw,mos,mfw,mef,mdc,kdc,kc2,iiq,gry,grey,gray,fpx,fff,exf,erf,dng,dcr,dc2,crw,craw,cr2,cmt,cib,ce2,ce1,arw,3pr,3fr,mdb,sqlitedb,sqlite3,sqlite,sql,sdf,sav,sas7bdat,s3db,rdb,psafe3,nyf,nx2,nx1,nsh,nsg,nsf,nsd,ns4,ns3,ns2,myd,kpdx,kdbx,idx,ibz,ibd,fdb,erbsql,db3,dbf,db-journal,db,cls,bdb,al,adb,backupdb,bik,backup
Scammers ask for $300 in Bitcoin to unlock the files.
Fabian Wosar seems to have discovered someone at AutoLocky and so he was able to release a Decrypter. You can download the Decrypter from the link at the end of the article.
Once you run Decrypter you will need to select the location of your encrypted files to start the decryption process.
You have to be careful. Until the validity of the decryption key is checked, you should create a copy of your encrypted files.