Now, You Can Identify the Ransomware That Encrypted Your Files

These days, no one is protected against ransomware. This is the malicious code which enters your computer without your permission and encrypts all the data stored in the device after that.

Once encrypted, the victims’ files are not accessible anymore, unless users pay a certain amount of ransom to the cyber criminals who have created the malicious software. Basically, this is the only way the hackers will give the decryption key to the victim. Using this decryption key, the victim can decrypt all his data and use it freely again.

Considering the large number of ransomwares nowadays, it is rather difficult for a victim to define which type of ransomware has attacked him. In case the victim knows which is the ransomware that attacked him, then he should check online if there are any decryption keys available online. In this way, he doesn’t need to pay the ransom to the hacker.

There is a brand new website called ID Ransomware, which does all these tricks and helps the victim to decrypt his files. ID Ransomware has been build by Michael Gillespie, who offers regular support to the ransomware victims. Gillespie has been very famous for decrypting various ransomware lately.

In order to use the ID Ransomware website, you will need two things. First, it is the ransom note file, which can take different forms, from HTML to text files, and then they’ll need one of the files encrypted by the ransomware.

You should select and upload both files in the two form fields on the ID Ransomware website, and click on the “Upload” button. After that, the analysis of the two files has begun, and in a few seconds/minutes (depending on server load), the website will tell you which ransomware variant has infected your PC.

Once the type of ransomware that attacked a user was found, the lucky users will receive a link where they can download a decrypter which will help them to unlock their files.

The users who are not-so-lucky will be redirected to a PC forum support thread, while also being asked to back up their encrypted data, hoping that they can recover their files as soon as a decrypter becomes available online.

Leave a Comment

Your email address will not be published.

Time limit is exhausted. Please reload CAPTCHA.