Цитирай:
Първоначално написано от алт
Приятел, имаш шанс за възстановяване, сега четох в Уикипедия за вируса, има инструмент официален https://www.decryptcryptolocker.com/
При обиските на ФБР лятото на 2014 са иззети личните криптиращи ключове.
http://en.wikipedia.org/wiki/CryptoLocker
On 2 June 2014, the United States Department of Justice officially announced that over the previous weekend, Operation Tovar—a consortium constituting a group of law enforcement agencies (including the FBI and Interpol), security software vendors, and several universities, had disrupted the Gameover ZeuS botnet which had been used to distribute CryptoLocker and other malware. The Department of Justice also publicly issued an indictment against the Russian hacker Evgeniy Bogachev for his alleged involvement in the botnet. [5][13][14]
As part of the operation, the Dutch security firm Fox-IT was able to procure the database of private keys used by CryptoLocker; in August 2014, Fox-IT and fellow firm FireEye introduced an online service which allows infected users to retrieve their private key by uploading a sample file, and then receive a decryption tool. [15][16]
|
Тоя инструмент го пробвах отдавна, изписа ми че файловете не са заразени с този вирус а някакъв друг
__________________
OCTAGON SF8008, VU+ SOLO SE V2 , Diseq 10X1 + 13.0Е,16.0Е,19.2E,23.5E,39.0E,45.0E,1.9E + 2X200 sm 43.0w <->90.0e Lg47la690 + Philips 55PUS7906
|