Share this article

Latest news

With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low

Copilot in Outlook will generate personalized themes for you to customize the app

Microsoft will raise the price of its 365 Suite to include AI capabilities

Death Stranding Director’s Cut is now Xbox X|S at a huge discount

Outlook will let users create custom account icons so they can tell their accounts apart easier

Identify the ransomware that encrypted your data with this free tool

3 min. read

Published onApril 19, 2016

published onApril 19, 2016

Share this article

Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more

Malware programs can infect your computer without you even being aware of it, working silently while extracting the information they’re after. On the other hand, malware like ransomware is quite obvious, making no efforts to hide their presence.

Ransomware are malicious programs that restrict access to the infected computer system, only to demand that the user pay a ransom in order to regain access to the system. Ransomware does the dirty deed in two different ways: either it encrypts files on the system’s hard drive or locking the system completely and displaying a message demanding the user to pay.

Companies and individual researchers are developing recovery toolsconstantly, which is why most of the time malware is successfully removed. However, there are rare cases when decryption is impossible and users pay the ransom for the encryption key.

If you have been infected and need to know which malware family encrypted your data, you can useID Ransomwareto find that out. All you have to do is upload an infested file or the message the malware is displaying to your screen.  ID Ransomware can currently detect 55 types of ransomware but does not offer any file recovery services. Here’s the list with all the ransomware it can identify:

7ev3n, AutoLocky, BitMessage, Booyah, Brazilian Ransomware, BuyUnlockCode, Cerber, CoinVault, Coverton, Crypt0L0cker, CryptoFortress, CryptoHasYou, CryptoJoker, CryptoTorLocker, CryptoWall 2.0, CryptoWall 3.0, CryptoWall 4.0, CryptXXX, CrySiS, CTB-Locker, DMA Locker, ECLR Ransomware, EnCiPhErEd, Hi Buddy!, HOW TO DECRYPT FILES, HydraCrypt, Jigsaw, JobCrypter, KeRanger, LeChiffre, Locky, Lortok, Magic, Maktub Locker, MireWare, NanoLocker, Nemucod, OMG! Ransomcrypt, PadCrypt, PClock, PowerWare, Radamant, Radamant v2.1, Rokku, Samas, Sanction, Shade, SuperCrypt, Surprise, TeslaCrypt 0.x, TeslaCrypt 2.x, TeslaCrypt 3.0, TeslaCrypt 4.0, UmbreCrypt, VaultCrypt

Uploaded files are analysed against the database of signatures. Results are ordered by the number of matches found between the malware and the data base. If the malware is identified, the files you uploaded are deleted. Once the rasomware type has been identified, you can search by the threat name to get the latest recovery information. Since many ransomware share similar extensions on files, in some cases, the results are not 100% clear.

If no results are found, the uploaded files are shared with trusted malware analysts for further analysis or for identifying a new malware type. As far as data confidentiality is concerned, ID Ransomware states clearly:

With that said, I cannot guarantee files are kept 100% confidential. The data is temporarily stored on a shared host [to be shared with trusted malware analysts if necessary], and I am not responsible for anything done otherwise with this data.

Obviously, our advice is to install an anti-malware software in the first place and avoid suspicious sites or files. We recommend BitDefender’s freeBDAntiRansomware.

RELATED STORIES YOU NEED TO CHECK OUT:

More about the topics:Cybersecurity

Madalina Dinita

Networking & Security Specialist

Madalina has been a Windows fan ever since she got her hands on her first Windows XP computer.

She is interested in all things technology, especially emerging technologies – AI and DNA computing in particular.

Prior to joining the WindowsReport team, she worked in the corporate world for a number of years.

User forum

0 messages

Sort by:LatestOldestMost Votes

Comment*

Name*

Email*

Commenting as.Not you?

Save information for future comments

Comment

Δ

Madalina Dinita

Networking & Security Specialist

Madalina is a Windows fan since forever, especially interested in AI, emerging technologies, privacy, and security.