As I have repeatedly said most security experts will advise against paying the ransom demands or engage in negotiating a payment with the malware developers for reasons expressed here and elsewhere by other victims.
Posted 01 February 2023 - 07:44 PM
As I have repeatedly said most security experts will advise against paying the ransom demands or engage in negotiating a payment with the malware developers for reasons expressed here and elsewhere by other victims.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 16 February 2023 - 10:01 AM
This site claims to be able to restore Lockbit encrypted files... Are they a.) lying, b.) in league with the scammers, or c.) holding out on us and hording the decryptor for personal gain?
https://monstercloud.com/cyber-security/ransomware-removal/
Posted 16 February 2023 - 10:12 AM
Bleeping Computer cannot vouch for those who claim they can decrypt data or help in other ways. We have have no way of knowing the background, expertise and motives of all companies or individuals who indicate decryption is possible. We have no way of vetting whether a person has a true technical method of recovering files, is scamming users by just paying ransoms for the key, or are the ransomware operators themselves. For the same reason, members are discouraged from providing remote access to unknown individuals or to provide data that could potentially be stolen. We advise to be cautious with whomever you are dealing with, what services they are able to provide and what claims they make before sending money or paying a fee to anyone.
In regards to data recovery services specifically, they typically act as a "middleman", pay the criminals...pretend they cracked the decryption and charge the victim more than the ransom demands, in many cases not telling them that is how they acquired the means of decryption. Other data recovery services hide the actual ransom cost from clients and/or mark the cost up exponentially as noted here.
Some data recovery services operate more like scammers while others like Fast Data Recovery have been reported to make false claims to be able to decrypt data by ransomware which is not decryptable and charge an assessment fee. Many of them instruct victims to submit one or two limited size files for free decryption as 100% proof they can decrypt the files with claims of 100% guaranteed success, collect the victim's money and are never heard from again. The criminals behind creating and spreading ransomware do the same.
Experts have identified Proven Data, Red Mosquito, MonsterCloud, Dr. Shifro and Fast Data Recovery as some of the most dishonest and predatory data recovery services. Connecticut-based Coveware CEO Bill Siege refers to such data recovery services as "ransomware payment mills".
Please read my comments in this topic for information as to what we know about those who claim they can decrypt data including using and paying data recovery services.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 16 February 2023 - 11:12 AM
Thank you very much for that excellent explanation and informative reply.
Posted 16 February 2023 - 01:39 PM
You're welcome.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 16 February 2023 - 02:14 PM
What is the entry point for a LockBit infection, could it be an infected Word document?
My EDR caught an infected word document at another customer's location, and I'm wondering if we just stopped a ransomware attack there.
Should I open a thread and upload that infected document?
Posted 16 February 2023 - 03:06 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 05 January 2024 - 01:19 PM
Create what?
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 07 May 2024 - 07:14 PM
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015 
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 07 May 2024 - 08:46 PM
Been a few years now since they hit me and we have moved on without all our previous data unfortunately. Hopefully this reduces the incidents and the pain people go through in the future.
Posted 08 May 2024 - 06:08 AM
While law enforcement originally stated that they were able to obtain 1,000 decryption keys as part of Operation Cronos, today's announcement reveals that they were able to obtain an additional 1,500 decryption keys and are continuing to assist LockBit victims in recovering their files for free.
So are the decryption keys already available? How do I know that they have the key for my encrypted data, for example?
0 members, 1 guests, 0 anonymous users