Hit by ransomware? Victims of these four types of file-encrypting malware can now retrieve their files for free

Hit by ransomware? Victims of these four types of file-encrypting malware can now retrieve their files for free

People who have fallen victim to FortuneCrypt, Yatron, WannaCryFake or Avest ransomware should now be able to retrieve their encrypted files without giving into the extortion demands of cyber attackers.

Three of the decryption tools have been released for free as part of No More Ransom, a joint initiative by tech security companies and law enforcement that is designed to help businesses and consumers in the fight against cybercrime.


Now more free decryption tools have been added to the No More Ransom arsenal, as Kaspersky Lab has provided tools for decrypting Yatron and FortuneCrypt, while Emsisoft has released a free decryptor for WannaCryFake.


SEE: Cybersecurity in an IoT and mobile world (ZDNet special report) | Download the report as a PDF (TechRepublic)


The authors of Yatron based it on Hidden Tear, a well-known form of open-source ransomware, and it encrypts victims' files with the extension .Yatron. However, researchers at Kaspersky identified mistakes in the crytopgtaphy of Yatron, allowing them to create the decryptor.




Researchers describe FortuneCrypt as a "unique" form of ransomware complied in the Blitz BASIC programming language – and the first form of file-encrypting malware to be coded in this way.


Despite the relatively simple programming language, FortuneCrypt has been deployed in thousands of attacks that threaten to delete files forever if payment isn't received in 24 ho ..

Support the originator by clicking the read the rest link below.