BITcrypt v2.o

All the file (word,excel, outlook pst ) are not opening. and it is saying


===============================================================================================================================================================================
BitCrypt v2.0 (bug fixed)
===============================================================================================================================================================================
English

Attention!!!


All necessary files on your PC ( photos, documents, data bases and other) were encoded with a unique RSA-1024 key.
Decoding of your files is only possible by a special programm that is unique for each BitCrypt ID.
Specialists from computer repair services and anti-virus labs won't be able to help you.
In order to receive the program decryptor you need to follow this link http://www.bitcrypt.cc and read the instructions.

If current link doesn't work but you need to restore files please follow the directions:
1. Try to open link kphijmuo2x5expag.tor2web.com. If you failed proceed to step 2.

2. Download and install tor browser http://www.torproject.org/projects/torbrowser.html.

3. After installation, start tor browser and put in the following address kphijmuo2x5expag.onion

Remember, the faster you act the more chances to recover your files undamaged.
===============================================================================================================================================================================


have anyone know its recovery tool?
LVL 6
Aditya AroraNetwork & Hardware Asked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

strivoliCommented:
"how remove bitcrypt ransomeware virus" should help you understand what's happening.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Aditya AroraNetwork & Hardware Author Commented:
yes i already read it but according to it my data is lost.
0
strivoliCommented:
Restore it from a backup.
0
Determine the Perfect Price for Your IT Services

Do you wonder if your IT business is truly profitable or if you should raise your prices? Learn how to calculate your overhead burden with our free interactive tool and use it to determine the right price for your IT services. Download your free eBook now!

Dan CraciunIT ConsultantCommented:
For years we had to convince clients that backups are necessary.
Usually we had to wait till a hard drive with important data on it died.

Now, with the spreading of CryptLocker, things changed. You can simply show 2-3 articles to a client and he'll ask how he can backup the data so it's safe.

CryptoLocker proved encrypting data and holding the key for ransom is a economically viable business, so expect a lot more of these type of ransomware to pop up. BitCrypt is an example.

And to answer the OP: if the program did it's job, you cannot decrypt your files unless you pay.

So your options are:
1. restore from backups
2. recreate your data
3. pay the ransom

HTH,
Dan
0
Aditya AroraNetwork & Hardware Author Commented:
Is there any way to block users to prevent/install such type of malwares.
0
Dan CraciunIT ConsultantCommented:
Yes. Considering that the main infection vectors are emails and compromised/malicious websites:
1. Keep your software patched so you don't get infected through exploits
2. Don't let users run with administrative rights
3. Don't let admins run with administrative rights, unless necessary
4. Get a good spam filter. One of the benefits will be that it will block most of the infected emails
5. Train your users to not open attachments from unknown people.
6. Train your users to not open attachments from known people until they confirmed that the sender actually sent the email.

A good resource is this: http://www.sans.org/critical-security-controls

The beauty of the Critical Controls is that they can be implemented one by one, and each successful implementation will greatly improve your organisation's security.

HTH,
Dan
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Anti-Virus Apps

From novice to tech pro — start learning today.