Ransomware that uses .onion websites – Ransomware Help & Tech Support – BleepingComputer

Posted: May 29, 2020 at 12:58 am

Edit: The reference I got from ID-ransomware is

SHA1: 46b9428f694ed7d56874995acca80e92f3817363

-------

Yesterday, I discovered that my NAS has been contaminated with ransomware. I knew nothing about ransomware so I did some studying and eventually tried to find a decrypter using two website:

- https://id-ransomware.malwarehunterteam.com

- https://www.emsisoft.com/ransomware-decryption-tools

Both websites were unable to determine the ransomware and both led me to this forum.

One thing about my ransomware is that, on the ransome note, it directs you to .onion websites using TOR browser, something I knew nothing of. Apparently, it is a special-use domain that makes it difficult to trace access. Sounds fishy and I havent even tried accessing the website.

My every limited knowledge about ransomware tells me that .onion websites is making it difficult to determine the ransomware. But I could be wrong altogether. It could just be a new ransomware. Again, I'm absolutely new to ransomware.

Either way, I'd like some suggestion on how to resolve this and decrypt my files. Thankfully, I do have a remote backup of my NAS but that backup was about 4 months ago. So a lot of files has been changed since. If decryption is possible, then I would like to go that route.

My files are decrypted with .encrypt extension

e.g. IMG_20180515.jpg is changed to IMG_20180515.jpg.encrypt

Many thanks in advance.

README_FOR_DECRYPT.txt 312bytes4 downloads

Edited by zgravity00, Yesterday, 11:01 PM.

See the rest here:
Ransomware that uses .onion websites - Ransomware Help & Tech Support - BleepingComputer

Related Posts