Defend what you create

Other Resources

Close

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to news

Files compromised by CryptXXX can now be decrypted by Doctor Web

June 14, 2016

Encryption ransomware is considered to be one of the most dangerous threats worldwide. It encrypts user private information and then demands a ransom for making it available again. Today, there are a lot of ransomware programs, and Doctor Web is successfully dealing with this type of Trojans for a long time already. In some cases, the compromised information can be restored—for example, our specialists have developed a decryption method for files that were compromised by CryptXXX before June 2016.

Trojan.Encoder.4393, also known under the name of CryptXXX, is a typical ransomware Trojan. It has several modifications that are being spread all over the world. To make more money on their illegal activity, virus makers created a special service responsible for paid file decryption. A certain interest rate goes to those who distribute the Trojan. All the CryptXXX modifications connect to one C&C server. Websites that offer the paid file decryption use the TOR network. Wide geography of the infection cases proves the popularity of this affiliate program and of the Trojan itself among attackers. All encrypted files are appended with the *.crypt extension, and files containing cybercriminals' demands are named as de_crypt_readme.txt, de_crypt_readme.html, and de_crypt_readme.png.

screen CryptXXX #drweb

If you have fallen victim to this malicious program, and files on your computer were encrypted before June 2016, it is possible to restore the compromised data. However, it depends on several conditions and especially on the user’s actions.

  • Do not remove any files from your computer or reinstall the operating system. It is also not recommended to use the infected computer until you get detailed instructions from Doctor Web technical support.
  • If you have run anti-virus scanning, do not try to cure or remove detected threats—technical support specialists may need them when searching for the decryption key.
  • Try to remember as much about the infection circumstances as possible: received dubious email messages, programs downloaded from the Web, or visited websites.
  • If you have the email message with the attachment that infected your computer once it was opened, do not remove it—our specialists may need it to identify the version of the Trojan.

To decrypt files compromised with CryptXXX, go to the Doctor Web decryption service page. Free decryption services are only available to users who have valid commercial Dr.Web licenses and whose systems—at the moment of infection—were protected by Dr.Web Security Space (Windows) or by Dr.Web Anti-virus for OS X or Linux (version 10 or later) or by Dr.Web Enterprise Security Suite (6+). Other users can purchase Dr.Web Rescue Pack by sending the standard request form: the service is charged if the analysis shows that your files can be recovered. Besides, clients who used this service can get free two-year license for Dr.Web Security Space for 1 computer. To find more information about ransomware Trojans, follow this link.

Tell us what you think

You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments

The Russian developer of Dr.Web anti-viruses

Doctor Web has been developing anti-virus software since 1992

Dr.Web is trusted by users around the world in 200+ countries

The company has delivered an anti-virus as a service since 2007

24/7 tech support

© Doctor Web
2003 — 2019

Doctor Web is the Russian developer of Dr.Web anti-virus software. Dr.Web anti-virus software has been developed since 1992.

2-12А, 3rd street Yamskogo polya, Moscow, Russia, 125040