ESET Releases Update of Decryption Tool for Victims of the Crysis Family Ransomware

Next story

Today, ESET has released an updated version of its free decryptor for ransomware victims. Anyone whose data or devices have been hit by the Crysis family, (detected by ESET as Win32/Filecoder.Crysis) - now adding  the .dharma extension, can now get their files back for free. The tool has been updated with master decryption keys recently released via a forum at BleepingComputer.com – mirroring the same key release scenario seen in November 2016 for older variants of this malware. With the current update, ESET’s decrypting tool can help victims of six unique variants of this specific ransomware family. Each of them is identifiable by the use of a specific extension: .xtbl, .crysis, .crypt, .lock, .crypted, .dharma.The Crysis malware family began gaining prominence after one of its main “competitors”, TeslaCrypt, ceased operations in the first half of 2016. Since then, ESET’s free decryption tools for those two families of malware have been downloaded by more than 50.000 users around the globe.If you have been a victim of Crysis ransomware, you can find and download the free ESET Crysis decryptor from our free utilities page. If you need additional information on how to use the tool, please refer to ESET Knowledgebase.

About ESET

Since 1987, ESET® has been developing record award-winning security software that now helps over 100 million users to Enjoy Safer Technology. Its broad security product portfolio covers all popular platforms and provides businesses and consumers around the world with the perfect balance of performance and proactive protection. The company has a global sales network covering 200 countries, and regional offices in Bratislava, San Diego, Singapore and Buenos Aires. For more information visit www.eset.com or follow us on LinkedInFacebook and Twitter.

 

The Company has global headquarters in Bratislava (Slovakia), with regional distribution centers in San Diego (U.S.), Buenos Aires (Argentina), and Singapore. ESET has malware research centers in Bratislava, San Diego, Buenos Aires, Singapore, Prague, Košice (Slovakia), Krakow (Poland), Montreal (Canada), Moscow (Russia). ESET Middle East has its regional office in Dubai Internet City and manages an extensive partner network in 11 countries: United Arab Emirates, Saudi Arabia, Kuwait, Qatar, Oman, Bahrain, Yemen, Lebanon, Jordan Egypt and Libya. More information is available via www.eset.com/me