A ransomware virus named Unname1989 quickly became red. Several security companies claimed that it could be decrypted, but some users lost their keys due to reinstalling the system or other reasons, and only backed up the encrypted files. At this time, some manufacturers' decryption tools will fail to decrypt.The Tencent computer housekeeper team launched an emergency response against the blackmail virus, and successfully cracked it in a short time. The developed non key decryption tool can perfectly recover the encrypted file even if the system is reinstalled or the key is lost for other reasons.
You should know that most blackmail viruses use high-strength asymmetric encryption algorithms to encrypt the poisoned computer files. The decryption private key is controlled in the hands of the person who implements the blackmail attack. Without the private key, even the most powerful computer cannot decrypt.This is also the fundamental reason why blackmail virus crimes can be successful again and again: unless the virus has a bug or public key, it will permanently lose the damaged file. The reason for the popularity of Unname1989 blackmail virus is that the author uses mobile phone scanning code to pay for ransom, while most blackmail virus crimes will use the anonymity of virtual cryptocurrencies such as Bitcoin to ask for ransom in order to escape the attack of law enforcement departments. After the blackmail virus infects the system, valuable data such as txt and office documents will be encrypted (unlike other blackmail viruses, the original file suffix is not modified), and a shortcut "Your computer files have been encrypted, click here to decrypt" will be released on the desktop.
After clicking, the decryption tutorial and collection QR code will pop up, prompting: "Your computer file has been encrypted, please complete decryption before XXX time, and delete the key after 2 days..."
Operation steps: 1) First of all, the first step is the key step. You need to be able to find the original version of any encrypted file (before encryption, such as photos, you can find it through your mobile phone, other devices, friends or backup data).This file is larger than 500KB. If you cannot find a file larger than 500KB, we can only help you recover other files smaller than 500KB