Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

BITcrypt v2.o

Posted on 2014-02-27
6
5,250 Views
Last Modified: 2014-03-07
All the file (word,excel, outlook pst ) are not opening. and it is saying


===============================================================================================================================================================================
BitCrypt v2.0 (bug fixed)
===============================================================================================================================================================================
English

Attention!!!


All necessary files on your PC ( photos, documents, data bases and other) were encoded with a unique RSA-1024 key.
Decoding of your files is only possible by a special programm that is unique for each BitCrypt ID.
Specialists from computer repair services and anti-virus labs won't be able to help you.
In order to receive the program decryptor you need to follow this link http://www.bitcrypt.cc and read the instructions.

If current link doesn't work but you need to restore files please follow the directions:
1. Try to open link kphijmuo2x5expag.tor2web.com. If you failed proceed to step 2.

2. Download and install tor browser http://www.torproject.org/projects/torbrowser.html.

3. After installation, start tor browser and put in the following address kphijmuo2x5expag.onion

Remember, the faster you act the more chances to recover your files undamaged.
===============================================================================================================================================================================


have anyone know its recovery tool?
0
Comment
Question by:Aditya Arora
  • 2
  • 2
  • 2
6 Comments
 
LVL 19

Accepted Solution

by:
strivoli earned 250 total points
ID: 39894556
"how remove bitcrypt ransomeware virus" should help you understand what's happening.
0
 
LVL 6

Author Comment

by:Aditya Arora
ID: 39894623
yes i already read it but according to it my data is lost.
0
 
LVL 19

Expert Comment

by:strivoli
ID: 39894720
Restore it from a backup.
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 34

Expert Comment

by:Dan Craciun
ID: 39896782
For years we had to convince clients that backups are necessary.
Usually we had to wait till a hard drive with important data on it died.

Now, with the spreading of CryptLocker, things changed. You can simply show 2-3 articles to a client and he'll ask how he can backup the data so it's safe.

CryptoLocker proved encrypting data and holding the key for ransom is a economically viable business, so expect a lot more of these type of ransomware to pop up. BitCrypt is an example.

And to answer the OP: if the program did it's job, you cannot decrypt your files unless you pay.

So your options are:
1. restore from backups
2. recreate your data
3. pay the ransom

HTH,
Dan
0
 
LVL 6

Author Comment

by:Aditya Arora
ID: 39898403
Is there any way to block users to prevent/install such type of malwares.
0
 
LVL 34

Assisted Solution

by:Dan Craciun
Dan Craciun earned 250 total points
ID: 39898412
Yes. Considering that the main infection vectors are emails and compromised/malicious websites:
1. Keep your software patched so you don't get infected through exploits
2. Don't let users run with administrative rights
3. Don't let admins run with administrative rights, unless necessary
4. Get a good spam filter. One of the benefits will be that it will block most of the infected emails
5. Train your users to not open attachments from unknown people.
6. Train your users to not open attachments from known people until they confirmed that the sender actually sent the email.

A good resource is this: http://www.sans.org/critical-security-controls

The beauty of the Critical Controls is that they can be implemented one by one, and each successful implementation will greatly improve your organisation's security.

HTH,
Dan
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
You may have a outside contractor who comes in once a week or seasonal to do some work in your office but you only want to give him access to the programs and files he needs and keep privet all other documents and programs, can you do this on a loca…
Learn how to make your own table of contents in Microsoft Word using paragraph styles and the automatic table of contents tool. We'll be using the paragraph styles in Word’s Home toolbar to help you create a table of contents. Type out your initial …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question