If your network gets infected with ransomware, follow the steps below to recover essential data:
Step 1: Do not pay the ransom because there is no guarantee that the ransomware creators will give you access to your data.
Step 2: Find any available backups you have, and consider keeping your data backups in secure, off-site locations.
Step 3: If there are no backups, you have to try decrypting the data locked by ransomware using the best ransomware decryption tools available.
In this anti-ransomware guide, we included these free decryption tools you can use to avoid all types of malware.
Navigate through these links to learn more.
How to identify the ransomware you’ve been infected with
Ransomware decryption tools
Explanation of ransomware families and tools for decryption
How to avoid ransomware in the future
Quick checklist for ransomware protection
How to identify the ransomware you’ve been infected with
Oftentimes, the ransom note provides details about the type of ransomware your files have been encrypted with, but it can happen that you don’t have this information at hand. Readers have asked us to show which encryption extensions belong to which ransomware families. Many of these extensions signaled new types of encrypting malware, for which there are no decryptors available.
If you need help with identifying what type of ransomware is affecting your system, you can use these two tools below:
Crypto Sheriff from No More Ransom
ID Ransomware from MalwareHunter Team
Ransomware decryption tools – an ongoing list
Disclaimer:
You should know that the list below is not complete and it will probably never be. Use it, but do a documented research as well. Safely decrypting your data can be a nerve-wracking process, so try to be as thorough as possible.
We’ll do our best to keep this list up to date and add more tools to it. Contributions and suggestions are more than welcome, as we promise to promptly follow up on them and include them on the list.
Some of the ransomware decryption tools mentioned below are easy to use, while others require a bit more tech knowledge to decipher. If you don’t have technical skills, you can always ask for help on one of these malware removal forums, which feature tons of information and helpful communities.
.777 ransomware decrypting tool
.8lock8 ransomware decrypting tool + explanations
Agent.iih decrypting tool (decrypted by the Rakhni Decryptor)
Alcatraz Ransom decryptor tool
Amnesia Ransom 2 decryptor tool
ApocalypseVM decrypting tool + alternative
Aura decrypting tool (decrypted by the Rakhni Decryptor)
AutoIT decrypting tool (decrypted by the Rannoh Decryptor)
AutoLT decrypting tool (decrypted by the Rannoh Decryptor)
Badblock decrypting tool + alternative 1
Chimera decrypting tool + alternative 1 + alternative 2
Cryakl decrypting tool (decrypted by the Rannoh Decryptor)
Crybola decrypting tool (decrypted by the Rannoh Decryptor)
Crypt888 (see also Mircop) decrypting tool
CryptFile2 decrypting tool (decrypted by the CryptoMix Decryptor)
CryptoHost (a.k.a. Manamecrypt) decrypting tool
Cryptokluchen decrypting tool (decrypted by the Rakhni Decryptor)
CryptoMix Ransom decrypting tool + offline alternative
CryptoTorLocker decrypting tool
CrySIS decrypting tool (decrypted by the Rakhni Decryptor – additional details)
CTB-Locker Web decrypting tool
CuteRansomware decrypting tool (decrypted by the my-Little-Ransomware Decryptor)
Dharma Ransom Rakhni decryptor tool
DeCrypt Protect decrypting tool
Democry decrypting tool (decrypted by the Rakhni Decryptor)
Derialock ransom decryptor tool
DMA Locker decrypting tool + DMA2 Locker decoding tool
Everbe Ransomware decrypting tool
FortuneCrypt decrypting tool (decrypted by the Rakhni Decryptor)
Fury decrypting tool (decrypted by the Rannoh Decryptor)
Globe / Purge decrypting tool + alternative
Jigsaw/CryptoHit decrypting tool + alternative
Lamer decrypting tool (decrypted by the Rakhni Decryptor)
LeChiffre decrypting tool + alternative
Lobzik decrypting tool (decrypted by the Rakhni Decryptor)
Lock Screen ransomware decrypting tool
Lortok decrypting tool (decrypted by the Rakhni Decryptor)
Marlboro ransom decryption tool
Manamecrypt decrypting tool (a.k.a. CryptoHost)
Mircop decrypting tool + alternative
Merry Christmas / MRCR decryptor
MoneroPay Ransomware decrypting tool
my-Little-Ransomware decrypting tool
Nemucod decrypting tool + alternative
NMoreira ransomware decryption tool
Operation Global III Ransomware decrypting tool
Ozozalocker ransomware decryptor
Petya decrypting tool + alternative
Planetary ransomware decrypting tool
Pletor decrypting tool (decrypted by the Rakhni Decryptor)
Polyglot decrypting tool (decrypted by the Rannoh Decryptor)
PowerWare / PoshCoder decrypting tool
Popcorn Ransom decrypting tool
PyLocky Ransomware decrypting tool
Rotor decrypting tool (decrypted by the Rakhni Decryptor)
Shade / Troldesh decrypting tool + alternative
Stampado decrypting tool + alternative
STOP Djvu Ransomware decryptor
Teamxrat / Xpan decryption tool
TeleCrypt decrypting tool (additional details)
TeslaCrypt decrypting tool + alternative 1 + alternative 2
Wildfire decrypting tool + alternative
WannaCry decryption tool + Guide
XORIST decrypting tool + alternative
Yatron decrypting tool (decrypted by the Rakhni Decryptor)
Explanation of ransomware families and tools for decryption
As you may have noticed, some of these ransomware decryption tools work for multiple ransomware families, while certain strains have more than one solution (although this is rarely the case).
From a practical perspective, some of the decryptors are easy to use, but some require some technical know-how. As much as we’d want this process to be easier, it doesn’t always happen.
No matter how much work and time researchers put into reverse engineering cryptoware, the truth is that we’ll never have a solution to all of these infections. It would take an army of cybersecurity specialists working around the clock to get something like this done.
How to avoid ransomware in the future
One of the most efficient ways to prevent the threat of ransomware from wreaking havoc and locking your sensitive data is to remain vigilant and be proactive.
In fact, we strongly recommend you to apply these basic and simple steps we outlined in the anti-ransomware security plan, that can help you prevent this type of cyber attack.
Safely keeping copies of vital information offline and equipping your company with cyber-insurance should be your enterprise’s main priorities. Even if cybercriminals get access to your computers and infect them with malware, you can just wipe the system clean and restore your latest backup. No money lost and, most importantly, no important information compromised!
So, please, do not postpone the process of doing a backup of your data and ensuring its security as well. Not tomorrow, not this weekend, not next week. Do it NOW!
Also, it helps to raise awareness on this topic and share the basics of proactive protection with your employees, because it could prevent them from being a ransomware victim, which secures your company’s network in the process as well.
As new types of ransomware emerge, researchers decrypt some strains, but others get new variants, and it may look like a cat and mouse game, in which proactivity is vital. Paying the ransom never guarantees you actually get your data back, as it might still end up for sale on the Dark Web.
Therefore, prevention remains the best medicine as always. Thor Foresight Enterprise protects your network against ransomware and data exfiltration with proprietary DarkLayer Guard™ & VectorN Detection technology that spots and stops threats at the DNS, HTTP, and HTTPs layers. Ransomware operators won’t stand a chance.
Antivirus is no longer enough to keep an organization’s systems secure.
Thor Foresight Enterprise
Is our next gen proactive shield that stops unknown threats
before they reach your system.
- Machine learning powered scans for all incoming online traffic;
- Stops data breaches before sensitive info can be exposed to the outside;
- Automatic patches for your software and apps with no interruptions;
- Protection against data leakage, APTs, ransomware and exploits;
Quick checklist for ransomware protection
Following this actionable protection guide will help both Internet users and organizations to better prevent ransomware attacks causing so much damage. Take the time to read this actionable checklist in which you can learn more about enhancing your online protection.
This article was originally published by Andra Zaharia on October 5th, 2016, and was updated by Ioana Rijnetu in March 2019 and by Alina Georgiana Petcu in November 2020.