1. Welcome Guest! In order to create a new topic or reply to an existing one, you must register first. It is easy and free. Click here to sign up now!.
    Dismiss Notice

Check Point releases working Decryptor for the Cerber Ransomware

Discussion in 'Ransomware Decrypters' started by starbuck, Aug 16, 2016.

  1. starbuck

    starbuck Rest In Peace Pete Administrator

    Joined:
    Sep 26, 2009
    Messages:
    3,830
    Location:
    Midlands, UK
    Operating System:
    Windows 10
    CPU:
    AMD Athlon II x2 250 Processor 3.00GHz
    Memory:
    8gb DDR3
    Hard Drive:
    500gb SATA
    Graphics Card:
    ASUS GeForce GTX 960 2gb
    Power Supply:
    650w PowerCool X-Viper
    For those who have been affected by the Cerber Ransomware and decided not to pay the ransomware, we have good news for you!
    Today, Check Point released a decryption service for the Cerber Ransomware version 1 and version 2 that allows victims to recover their computer's decryption key and decrypt their files for free.
    The files types that can be decrypted by this ransomware are those that end with .CERBER and .CERBER2 extensions.

    0e1e90e22e630577d86f6985967d0b82.jpg

    At this time, it is not known how Check Point is able to decrypt the Cerber files, but based on their access to the Cerber backend, they most likely were able to acquire the Master Decryption Key, rather than finding a weakness in the encryption algorithm.
    Using this Master Decryption Key, they can then extract a victim's unique key from an uploaded encrypted file.

    How to Decrypt .CERBER and .CERBER2 Files

    In order to use this service, victims can visit the CerberDecrypt.com site and upload an encrypted .CERBER or .CERBER2 file that is 1MB or smaller.
    Once the file is uploaded, Check Point will extract the private key associated with your computer and make it available for download.
    Victim's must then download both the private key file, which will be named pk, and the decryptor to the same folder.

    Once a victim has downloaded both files, they can simple double-click on the decryptor to start scanning the computer for files to decrypt.

    1a8accca88bddeba455d22dc0ea0979a.png

    The Check Point Cerber Decryptor will scan the computer for encrypted files and decrypt them.
    Please note that there are appears to be a bug in the user interface that indicates encrypted files on the Network are being detected, even for those who are not connected to a network.
    This bug can safely be ignored.

    When it has finished decrypting your files, a victim will be presented with a message that states the disk has been decrypted.
    As an extra bonus, the decryptor will have removed any ransom notes that are not located on the Windows desktop.

    72fe765ad3e7276edd4d61c95a182bd7.png

    The victim's files should now be decrypted.


    Credit and Source:
    Lawrence Abrams
    http://www.bleepingcomputer.com/new...-working-decryptor-for-the-cerber-ransomware/
     
  2. Tony D

    Tony D Administrator Administrator

    Joined:
    Sep 25, 2009
    Messages:
    5,102
    Location:
    SE Pennsylvania, USA
    Operating System:
    Windows XP Professional
    Yeah, let's hear it for the good guys and gals.
     

Share This Page