Avatar of Curtis Long
Curtis LongFlag for United States of America

asked on 

Ransome ware decrypt (Scarab)

I have a friend who was hit with ransom ware.  The files are encrypted with scarab extensions.

He tried paying the ransom but did not receive any fix.

Is there anyway to decrypt the data or is he just pretty much up the creek??

He does not have any backups.
Encryption

Avatar of undefined
Last Comment
John
ASKER CERTIFIED SOLUTION
Avatar of John
John
Flag of Canada image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
SOLUTION
Avatar of Alan
Alan
Flag of New Zealand image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
SOLUTION
Avatar of Jackie Man
Jackie Man
Flag of Hong Kong image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of Olgierd Ungehojer
Olgierd Ungehojer

Some times antivirus companies providing some decryption tools, you can find on Kaspersky webpage. Sometimes shadow copy helps or deep data recovery from hdd may help. Paying to criminals is bad idea and it never works.
Avatar of John
John
Flag of Canada image

Thanks. I hope you will be able to help your friend make good backups on an ongoing basis.
Encryption
Encryption

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

8K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo