As part of the No More Ransom initiative, Avast Antivirus has released a tool that decrypts files locked by LambdaLocker ransomware. Details may be found at: http://zd.net/2i9QNHF.
From an article by Mark Wyciślik-Wilson in the BetaNews web site:
“The Petya ransomware — and several variants — wreaked havoc with data around the world, but now the author of the original malware has released the master decryption key.
“Janus Cybercrime Solutions has provided a key that work with all “official” variants of Petya (meaning NotPetya is not included). The key was released to — of all places — Mega, and its authenticity has been verified. While Petya has already been cracked, the key offers the fastest and most reliable decryption method yet.”
The brief, but full, article may be found at: https://betanews.com/2017/07/07/petya-universal-decryptor/.
The latest malware (malevolent software) is called Petya or Petrwrap. It appears to be a more vicious version of the earlier WannaCry problem that caused so much damage to Windows systems. Petya is expected to be worse.
Both are versions of “ransomware,” products that lock up your files and block you from accessing your own information until you pay a ransom. The thieves then promise to unlock the files and restore your access once you pay the ransom. Unfortunately, experience has shown the thieves often simply take the money and then disappear. The files typically never get unlocked.
Fortunately, there are several methods to restore your files without paying a ransom if, and only if, you are properly prepared in advance of the problem.
A new malware (malevolent software) called “Judy” is potentially one of the most widely spread pieces of Android malware we’ve seen to date. It’s currently believed that upwards of 36.5 million Android devices may have already been infected.
“The malware uses infected devices to generate large amounts of fraudulent clicks on advertisements, generating revenues for the perpetrators behind it,” according ti the new report from Check Point.
Details may be found in an article by Yoni Heisler in the BGR web site at: http://bit.ly/2riPyJb.
Aomei Backupper Free is a freeware Windows 10/8.1/8/7/XP/Vista backup utility that’s “specially designed to protect your system and files against ransomware.” Actually, there are dozens of backup programs available for Window2s and most of them do a good job at saving files. What sets Aomei Backupper Free apart from its competitors is the protection offered against specific to WannaCry and other ransomware. Specifically, it instructs you on the kind of backup to make if you haven’t been affected and what to do if you have.
With the help of AOMEI Backupper Free, you can easily back up system, files, disks, partitions on desktop and laptop computers by creating backup image and restore all your important data when your computers have been attacked. What is more, even if your computer has already been infected with Ransomware, you can still use AOMEI Backupper to create image files in System Backup, Disk Backup, Partition Backup not only to prevent from more serious data loss caused by misoperation or a new mutation of Ransomware, but also “froze” the countdown of Ransomware.
Ransomware, which is often transmitted by email or web pop-ups, involves locking up people’s data and threatening to destroy it if a ransom is not paid. The global cyberattack has affected 200,000 Windows computers in more than 150 countries, including the United States, China, Japan, South Korea, Germany and Britain.
An article by Brian X. Chen in the New York Times at http://nyti.ms/2pR6YJg gives advice on how to avoid the ransomware problems.
Anyone running Microsoft Windows, especially with Microsoft Office or Microsoft Word, needs to be aware of three new threats to their computers. All three use exploits to deliberately corrupt files that automatically trigger bugs in Office and underlying bugs in Windows itself. Linux and Macintosh systems apparently are not affected by these malicious products.
Most anti-virus products do not yet detect these threats.