Jump to content

[helprecover@foxmail.com].help Ransomware


Chathura

Recommended Posts

My external hard disk is infected by a ransomware and it encrypted the files and renamed the files with [helprecover@foxmail.com].help extension. 

The documents are very important and need to decrypt ASAP. I want to know is there any decryption tool available and how can I download it? Even it is paid one it is ok. 

Thank you. 

Link to comment
Share on other sites

Hello @Chathura

Welcome!

In terms of recovering/decrypting the files, this type of virus usually encrypts the files with very high bit keys, and in very rare cases a decryptor can be created, usually due to failure or careless programming of the malware. But in the vast majority it is not possible, at least at the moment.

  1. You can check if the ransomware that’s attacked you currently has the possibility to be decrypted at ID RANSOMWARE,
  2. You may find information at: NO MORE RANSOME
  3. Also try Kaspersky Recovery tools
  4. If you are a Kaspersky user with a valid license, open a support ticket in your MyKaspersky account, send them a sample of an encrypted file, and if you have the same file unencrypted.
  5. Also, read Why you should NOT pay ransom to malware creators

Thank you🙏

Flood🐳 +🐋

Link to comment
Share on other sites

  • 9 months later...

My external hard disk is infected by a ransomware and it encrypted the files and renamed the files with [helprecover@foxmail.com].help extension. 

The documents are very important and need to decrypt ASAP. I want to know is there any decryption tool available and how can I download it? Even it is paid one it is ok. 

Thank you.

Link to comment
Share on other sites

@Teja Van Gal Welcome.

Please see this :

https://noransom.kaspersky.com/  (*)

https://support.kaspersky.com/us/14844 

https://www.kaspersky.com/blog/no-no-ransom/13364/ 

https://id-ransomware.malwarehunterteam.com/ 


(*) “Ask for the tech support (only for Kaspersky’s paid products customers)”

 

Also, in a lot of cases files can't be decrypted without the private key that is only known by the attacker.

Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now


×
×
  • Create New...