Solved

Cerber 3 Ransomware Decrypt Keys

Posted on 2016-10-12
5
111 Views
Last Modified: 2016-11-01
Hi does anyone know where i can a legit Decrypt keys for a Ceber3 ramsomware encrypted files. I don't have backup and i am i serious need of help to recover Payrol Files.

Thanks
0
Comment
Question by:Ngwenu Basoli
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 14

Assisted Solution

by:Andy M
Andy M earned 125 total points (awarded by participants)
ID: 41840115
not sure you can get hold of the legitimate decryption keys without paying the ransom. There's some information on here that may help but by the look of it attempts to break the encryption may result in a loss of the files altogether:

http://sensorstechforum.com/remove-cerber-3-ransomware-restore-cerber3-encrypted-files/
0
 
LVL 16

Accepted Solution

by:
Ivan earned 125 total points (awarded by participants)
ID: 41840121
Hi,

I don't think there is decrypter for version 3. There was for earlier version.

You can follow up news regarding ransomware and decrypting tools on following link, so maybe there will be some tool available soon..
Link: https://twitter.com/demonslay335

Regards,
Ivan.
0
 
LVL 19

Assisted Solution

by:*** Hopeleonie ***
*** Hopeleonie *** earned 125 total points (awarded by participants)
ID: 41840305
0
 
LVL 63

Assisted Solution

by:btan
btan earned 125 total points (awarded by participants)
ID: 41843097
It was mentioned in the past of Trend Micro Ransomware File Decryptor, that can decrypt files encrypted by Cerber. But for the variants there are no further decryptor. You may still attempt but do have a backup to test. Safest is still to recover data from your past latest backup, this is best effort.

Also note the Trend Micro caveats
CERBER Decryption Limitations
CERBER decryption must be executed on the infected machine itself (as opposed to another machine) since the tool needs to try and locate the first infected file for a critical decryption calculation.

Due to the method of decryption for CERBER, the tool may take several hours (average is 4) to complete decryption on a standard Intel i5 dual-core machine.   In addition, the encryption logic for CERBER also is built in such a way that the more cores a CPU has, the lower percentage chance of success for the decryption because of its complexity.

Similar to some other types of ransomware encryption, some files may be only partially decrypted and may require a subsequent file repair.
https://success.trendmicro.com/solution/1114221-downloading-and-using-the-trend-micro-ransomware-file-decryptor
0
 
LVL 63

Expert Comment

by:btan
ID: 41868069
Without decryption key and backup, the original  files will not be recoverable.
0

Featured Post

SuperAntiSpyware Licenses Discounted by 25% !

Exclusive offer to Experts Exchange Members!
Buy SuperAntiSpyware License(s) from us and save 25% on the regular purchase price.
- Includes Full SuperAntiSpyware Vendor Support Entitlements
- Your Subscription does not begin until you activate your license
- Buy for your friends

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Behavior-based and anomalies detection for Microsoft 3 64
Fraud Email 22 124
VPN Exposure 19 35
security, windows patches update 27 46
OnPage: Incident management and secure messaging on your smartphone
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question