Have you been exposed during the last period to ransomware?. Viruses developed with the beginning of the high price of bitcoin from 2017 until the present time. Ransomware spread as a result of malware and setbacks of the popular tools that led to users falling as prey to this type of virus.
What is the Ransomware
"Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website". Source: CISA
Ransomware was the most severe hacker attack against organizations and individuals, which rely on a trade-off between user data corruption or pay to obtain it. Ransomware takes one working method, which is encrypting all files and folders and requiring you to spend a lot of money to give you decryption keys.
Extensions can be decoded for free
Many companies and individuals have suffered from this type of virus, which leads to material losses, and they cannot track the source of cyberattacks. Today, the world is suffering from CoronaVirus crisis, that led to the cessation of most human activities and the death of many people, which has led to sympathy and solidarity of countries and institutions and the spread of moral and material aid. A group of hackers tended to abandon their viruses and provided solutions and keys to decrypt some of these viruses.
They offer a keys that helps you to decrypt infected files, or you can wait for the antivirus companies until they release a tool that contains these keys.
The keys are classified into three subfolders inside keys folder. If your encrypted files have one of the following extensions then you will need (main) subfolder from (keys) folder:
xtbl - ytbl - breaking_bad - heisenberg - better_call_saul - los_pollos - da_vinci_code - magic_software_syndicate - windows10 - windows8 - no_more_ransom - tyson - crypted000007 - crypted000078 - rsa3072 - decrypt_it
If your encrypted files have one of the following extensions then you will need (alt) subfolder from (keys) folder:
dexter - miami_california
How to protect your data
You can easily protect your data from spying or hacking, by following several steps that accelerate you to protect your computer from cyber-attacks. In the past, we had written an article entitled "The Best Protection Guide" which includes all the ways to protect your data online and offline. In the article, you will find solutions and tools to develop your security with many tips and advice.