V
V
Vladimir2021-10-20 09:51:17
Data recovery
Vladimir, 2021-10-20 09:51:17

Is it possible to recover data after the ransomware?

There is a laptop on which backup was not configured and there was a Trojan encryptor that brazenly took advantage of this. In general, if you have the original file and one encrypted file, is it possible to calculate the key? What software is better to do this and, as a result, decrypt the rest of the documents? The file format has not changed, but the text has been replaced with something like this:

P0vLlsQґзPi-yј!В'юЌў„яію*џeDЮ'џў3ЛДђБэџe'in
eyujObvhѓЇЯ МФЂПЏ{qel>Y;nuwџњtMЏµЖА·G–(ИJj''†tйў/prYchbзb«шÈÑh:ЗЊЊ Џ®ХяХ° }hГ™MrҐДНіќАш¬зґ2d5Иќ6Ц‹J'«…*Я•іє w{С
?yonEAG–Щ>є®ЋfЉ{ tr DagYoe
¶ЈY№(pШXaE“4¤з4€KЦ6

Office Word docks can not be opened, but Wordart copes with this.

Answer the question

In order to leave comments, you need to log in

5 answer(s)
Z
Zettabyte, 2021-10-20
@Zettabyte

if there is a source file and one encrypted file, is it possible to calculate the key?

Consider no. I'm afraid to talk nonsense, because it was a long time ago, but we studied a similar task for WinRAR 4 and files encrypted by it. Then, in my opinion, they came to the conclusion that in the presence of an unencrypted file, 128-bit encryption becomes approximately 100-bit.
You should do the following:
Remove the hard disk / SSD from the laptop, connect it to another computer, download the free R.saver on that computer , and do a full scan of your disk.
Depending on how the virus worked, how much free space was available, and how long the laptop was used after the attack, there is a chance to recover data deleted by the ransomware, but not subsequently overwritten.
If you have an SSD, then it would be optimal to turn off the computer as soon as possible so that TRIM does not delete the files.
Also, either put this disk aside until better times, or make a sector-by-sector copy (uncompressed), or copy all the files somewhere. In the case of an SSD, the option to store a disk is not suitable - memory cells will lose charge without being used.
This is so that if some of the special services take the attackers' server and lay out the keys, you can use them.

K
kalapanga, 2021-10-20
@kalapanga

Once upon a time, when such ransomware had just appeared, and computers were less powerful, malware used primitive algorithms (stupidly xor some kind) to quickly encrypt many files. Then there was still a chance to decipher something. Now there is almost no chance.

R
Ronald McDonald, 2021-10-20
@Zoominger

No.

J
javedimka, 2021-10-20
@javedimka

Try looking for something on the link.
https://noransom.kaspersky.com/en/

P
Puma Thailand, 2021-10-21
@opium

Not

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question