CryptXXX attacked my computer today. All of my important data have been encrypted and the hackers asked me to pay 500 for them. Is it possible for me to get my data back without paying the ransom? Please help me. Thanks!
It must be a big trouble to get infected by ransomware, since ransomware can stop you from using your PC or accessing your important data until you pay for “ransom”. There are different variants of ransomware which generally can be divided into two categories: the Crypto ransomware and non-Crypto ransomware. Usually, the former encrypts your important data, while the latter locks your computer. But they have one thing in common – demand you to pay a “ransom” to regain access to your computer or data.
In this article, we are going to talk about a Crypto ransomware called CryptXXX. If your computer has been unforunately infected by this ransomware and you are looking for guides to remove this threat from your PC, then you can continue reading.
|First Released in||April, 2016|
|Latest Version||CryptXXX 3.0|
|Spreading Ways||Spam emails; Exploit kits|
|Target OS Types||Windows XP, Windows7, WindowsVista, Windows 8, Windows 10|
|Main Behaviors||Encrypt files; Display ransom note|
CryptXXX is another strain of ransomware which was first found by ProofPoint in the middle of Apirl 2016. Security experts say this ransomware spreads via web pages that host the Angler exploit kit which takes advantage of vulnerabilities to push the Bedep click-fraud malware on the users’ computer systems. Bedep has the capability of downloading malware, so it will download the CryptXXX ransomware as a second-stage infection, dropping it as a delayed execution DLL and setting to wait 62 minutes before launching.
ProofPoint researchers believe that CryptXXX was developed by the same cybercrime gang who conducted the Reveton ransomware campaign in 2012, since they see similarities between CryptXXX and the older Reveton ransomware. The similarities inlcude: coded in Delphi; use a custom C&C protocol on TCP 443; use a delayed start; DLLs are named with a custom entry function; the directory of %AllUsersProfile% contains a .dat file; has the capability of stealing Bitcoins and credential.
After getting installed and executed, CryptXXX scans all the local hard drives, removable drives, and mapped drives for targeted file types and encrypt them after it attacks your computer. The ransomware searches for and encrypts files with the following extensions:
Having finished the encryption, the ransomware will create a text file, an image and an HTML webpage on the infected computer. The image is set as the desktop wallpaper; the HTML webpage is opened in a browser; while the text file is palced in the hard drive. They are all created to imform you that your files are encrypted by a strong encryption with RSA4096 and you have to make a payment for the private key and the decrypt program in order to get all your files back.
Screenshot of the text file
Screenshot of the desktop wallpaper and HTML webpage
By clicking the link provided in the HTML webpage, you will see a new page with multi-language support as shown below:
This page informs that your files are encrypted and to get the key to decrypt files you have to pay 500USD. If payment is not made before the specific time, the cost of the decrypting files will increase 2 times, namely you need to pay 1000 USD. You can directly make the payment on this page. It provides details on how to make the payment, how to download and use the decrypter use and also allows you to try decrypting one file for free before the payment. There is even the FAQ page that lists a series of questions and answers which may be helpful for you.
Should You Pay the Ransom?
Generally, it is not suggested to pay the ransom. Here are some reasons:
- By paying the ransom, you just encourage the cyber criminals to continue creating ransomware like CryptXXX to infect more computers and extort more money from the innocent computer users.
- There is no guarantee that paying the ransom will give you access to your files again. Paying the ransom could also make you a target for more malware.
- It is possible to decrypt files encrypted by the ransomware by using a decryption tool created by Kaspersky.
Surely, if you think the decrypted files are very important to you, so that you don’t allow anything to go wrong, then you can try making payment for the decrypter provided by the ransomware developers and see whether they will keep their promise.
What Should You Do after Being Attacked by a Crypto Ransomware?
Once you find that your PC has been attacked by a ransomware, the first thing you need to do is to disconnect the Internet so as to prevent the ransomware from downloading other types of malware on your PC. Then, you should identify the type of ransomware. You can take down the basic content of the ransom note and then search on Google using your phone or another healthy computer. You may find information about the ransomware, including its name, characteristics and others. Next, make a copy of your hard drive. If a free decryption tool is developed, you can try encrypting the encrypted files without worring the files would be damaged for unexpected reason. Afterwards, restart your PC into the Safe Mode and try using your antivirus program or any other more powerful malware removal tool to remove the ransomware. In case you want to pay the ransom, you’d better save a copy of the ransom note.
How to Remove CryptXXX Ransomware from Your PC?
If your computer has got infected by the ransomware, you should quickly remove it in order to avoid other unwanted problems. There are methods for you to remove this threat: 1. Remove it with a powerful malware removal tool. 2. Perform a system restore. Here are the guides:
Remove CryptXXX Ransomware by Using SpyHunter.
Now you can follow these steps to remove the ransomware with SpyHunter:
» Use a healthy computer to download SpyHunter-installer.exe.
» Copy the downloaded file to the infected computer. Double-click the downloaded file to start installing SpyHunter on your PC.
» When a dialog box pops up as below, click the Run button.
» Select your language and click OK button.
» Click CONTINUE to proceed.
» Click I accept the EULA and Policy and click the INSTALL button.
» Now you can see that SpyHunter is being installed on your PC.
» Once SpyHunter is successfully installed on your PC, click the EXIT button.
» Then, boot your PC into the Safe Mode. After you access the desktop, double click the icon of SpyHunter to launch it. On its main screen, click the Scan Computer Now button to do a full system scan.
» SpyHunter now will start scanning the whole system for any existing threats.
» When the scanning is done, SpyHunter will show you all detected threats. Click the Fix Threats button if you want to remove all found threats.
Warm tips: If you are using the free version of SpyHunter, you need to first upgrade it to the registered version before you can fix the threats completely.
Remove Cryptxxx Ransomware by Performing System Restore
Generally, performing system restore can help fix the malware issues. However, this method doesn’t always work. If the ransomware has infected the restore points, it is almost impossible to clean out this threat from your PC. But anyhow you can have a try. Now follow the steps below.
For Windows 7/Vista:
- Click Start menu and enter system restore into the search box. Then, click System Restore from the result list.
- In the popup window, select the option of Recommended restore or Choose a different restore point (if the malware infection occurred earlier than the date of the Recommend restore , you need to choose the later option).
- Then, you’ll be presented with a list of restore points you have created previously. If you want more options, check Show More Restore Points. Then, you can Select an acceptable restore point and click Next.
- Confirm your restore point and click on Finish. A dialog box will pop up and ask you to confirm that you really want to perform a system restore. If you’re sure to do so, click Yes. This will start the system restore.
- Please wait while your Windows files and settings are being restored.
- After the System Restore completes, please log into your account.
- Then, you will see a dialog box as below once the desktop loads up.
For Windows XP:
- Log on to Windows as an administrator. And then click the Start button > All Programs > Accessories > System Tools, and then click System Restore.
- The Welcome to System Restore page will pop up as below. Select the Restore my computer to an earlier time option, and then click Next.
- The Select a Restore Point page will appear. Choose a bold date on the calender and select a proper system restore point in the On this list, click a restore point list, and then click Next.
- A System Restore message may appear that lists configuration changes that System Restore will make. Then, click OK.
- After the System Restore completes, your computer will be rebooted, and you will see a screen that contains information confirming that the system restore has been successfully done.
For Windows 8:
- Right click the bottom left corner of your computer screen, and click Control Panel.
- Locate view by and select Category. Find and click System and Security and then click System. In the open window, find and click on Advanced system settings.
- A small window will pop up. Under system Protection tab, click on System Restore.
- Then click Choose a different restore point.
- Now select a restore point and click Next.
- Click Finish.
- Click OK when a small dialog box appears. Then the System Restore will start.
- When the System Restore is done, your computer will be restarted itself. Then, you will receive a message as shown below on your desktop. Click Close.
How to Decrypt and Restore the Encrypted Files?
Once you have successfully removed the ransomware, you can try decrypting and restore the files encrypted by the ransomware. We are not sure that all the methods introduced below are helpful. But you still can have a try before you make the payment.
Method 1: Decrypt the Files by Using Kaspersky’s RannohDecryptor
Kaspersky Labs has developed a decryption tool to decrypt files encrypted by CryptXXX. But unforunately, this tool is only effective when your computer gets infected by the CryptXXX versions 1.0 and 2.0. The version 3.0 of the ransomware has been added new capabilities including network share encryption, which makes it ineffective for the decryption tool to decrypt the files.If your computer is attacked by the latest version of the ransomware, you have to wait and see if Kaspersky can update their decryptor.
Download link for Kaspersky’s RannohDecryptor:
Visit here to learn how to decrypt files with RannohDecryptor:
Method 2: Use File Recovery Software
If Kaspersky’s decryption tool cannot help you, then you can try using the following file recovery software to recover some of your original files:
- Stellar Phoenix Photo Recovery
- Data Recovery Pro by Pareto Logic
- Stellar Phoenix Windows Data Recovery
- Stellar Phoenix Data Recovery Technicians License(Pro version with more features)
Method 3: Use Shadow Volume Copies
Method 4: Backups
If you luckily have a backup of the encrypted files, then you can restore them easily. Check here to learn how to restore files from a backup.
Have you successfully remove the ransomware and restored your files? If your answer is yes, then congratulation to you! If not, don’t be upset. There is always a way. Maybe Kaspersky’s new decryption tool will be released tomorrow. But no matter your problems have been solved or not, don’t forget to safeguard your PC with a reliable anti-malware program so as to avoid future infection. A simple action will save you much trouble. It is highly recommended that you install SpyHunter on your PC. It can not only help protect your PC from malware attacks, but also detect and clean all types of threats from your system. Click the button to download this tool on your PC right now!
The following video offers a complete guide for CryptXXX Ransomware removal. You’d better watch it in full-screen mode!