• Emsisoft

Emsisoft lanza un descifrador gratuito para el infernal ransomware LooCipher


Nuestro equipo de malware acaba de lanzar un descifrador para la variedad LooCipher de ransomware. Hellfire a la espera del autor (es) de ransomware.

Si eres víctima de este ransomware, descarga el descifrador GRATUITO que se encuentra a continuación y NO PAGUES el rescate. También se incluye una guía detallada.

Descargue el descifrador LooCipher aquí

Emsisoft LooCipher Decryptor

Detalles Técnicos

Se cree que el LooCipher se propaga a través de spam de acuerdo con BleepingComputer. El ransomware luego utiliza documentos habilitados para macros para cifrar los archivos de la víctima usando AES-128 ECB, y agrega la extensión ".lcphr".

Luego, se instruye a la víctima para que realice un pago de BitCoin y luego use el mismo malware para descifrar sus archivos una vez que se complete el pago. La nota de rescate que se crea, "Please_Read_Me.txt", contiene el siguiente texto:

Q: What happened to my files? A: All your important files (including those on the network disks, USBs, etc.) have been encrypted using a strong algorithm with a private and unique key generated for you.

Q: Where is my key? A: Your key is stored in our TOR servers in order to preserve the anonymity.

Q: What do I do? A: You need to make a Bitcoin payment for the decryption. Please send €300 (~$330) worth of Bitcoin to this address: 1Ps5Vd9dKWuy9FuMDkec9qquCyTLjc2Bxe

Q: Can I recover my files by other means? A: No. There is not such a computing power nowadays to find this key within the time of a human could live. Even if you use Tianhe-2 (MilkyWay-2), currently the fastest supercomputer in the world, it will take millions of years. Neither NO ONE ANTIVIRUS CAN BRING YOUR FILES BACK, the only thing they could do is delete the decryptor software, but it’s impossible they can recover your files, and if some of them is trying to sell you that, we invite you to purchase it and try.

Q: How much time do I have? A: You have 5 days since your files were encrypted. Specifically until 2019/06/24 14:28. After this period your key will be automatically destroyed (except for the case of having made the transaction within the period but because of the transaction remains pending of being confirmed by the blockchain this time period is excedeed. In this case the key will remain safe throughout all this “pending of being confirmed” status of your transaction and additionally it will remain 7 days more after your transaction is confirmed in order that you have enough time to recover your files)

Q: How can I trust? A: We strongly guarantee you can recover your files. Besides, if we didn’t do it nobody trust us and we wouldn’t get any payment. In fact, we built the decryptor in the own encryptor software as well in order to make the decryption process as simple as possible for you, thus avoiding having to download an external decryptor. Just make the payment, click and if your payment is approved the button will become enable to click.

If somehow you closed the decryptor window and you can’t run the decryptor software you can download a copy of the decryptor through this link: https://mega.nz/#!KclRVIRY!YrUgGjvldsoTuNZbCOjebAz5La7hbB41nJHk1mlgqZo (Don’t worry, your files won’t be re-encrypted if they already are).

Copy of ransom note courtesy of BleepingComputer

File decryption in process

#LooCipher #Ransomware

5 vistas

Unete a nuestra lista de correo

No te pierdas ninguna actualización

Gracias por tu mensaje!