How to Recover Encrypted Files Using CRY128 Decrypter?


Issue: How to Recover Encrypted Files Using CRY128 Decrypter?

I need help decrypting files affected by CRY128 ransomware. I’ve heard that CRY128 decrypter has been released, but I’m not sure I will know how to use it properly. I really don’t want to mess up and lose my data. Can you walk me through the data recovery process?

Solved Answer

Image of the CRY128 decrypter

The first of May is a lucky day for everyone who had their files encrypted by CRY128 ransomware virus. On this day, Emsisoft has released a free decryption software which everyone can download from the researchers’ official website. Emsisoft is one of the leading companies in the fight against ransomware which can be proud of its titles as Microsoft Certified Partner and OPSWAT Gold Partner. Thousands of users have already been saved from having to give away their money to the extortionists and now is the time for the CRY128 victims to get back their files. In the following article, we will give a brief overview of the virus in order to help users recognize the virus easier. But if you are certain about the origin of the infection already, you can skip straight to the decryption instructions below, where you will learn how to use CRY128 and achieve best recovery results.

For those unfamiliar with ransomware working principles, we can briefly say, that these parasites are specifically designed to infiltrate computers and render the victim’s personal data unreadable. Some ransomware use spam campaigns to reach devices, but CRY128 and virtually the whole CryptON family from which it stems rely on RDP (remote desktop service) vulnerabilities and brute force their way into the targeted systems. When the virus is finally deployed on the computer, it starts scanning the hard drive, external devices and other places that may contain files on the computer. It is specifically looking for archives, Office files or media that may have some personal value to the victim. This way, data owners are more likely to pay for their recovery. And that is what the extortionists are aiming for. They drop a ransom note called _DECRYPT_MY_FILES.txt in which the victims learn all about what happened to their files and how they can revert the changes. The price of a decryption key that the extortionists offer is 0.388 BTC (around 722 USD), but the risk that the extortionists will vanish with your money is just not worth taking, especially when you can now decrypt your files for free. So, without further ado, let us begin with the Cry128 decryption guide.

How to decrypt files using free Cry128 decryptor?

Recover now! Recover now!
To recover needed system components, please, purchase the licensed version of Fortect Mac Washing Machine X9 recovery tool.

Step 1. Take care of Cry128 virus removal

Before you start with the data recovery, you should first make sure all Cry128 virus components are eliminated from your computer and won’t interfere with the recovery process. Keep in mind that the leftover malware may repeatedly encrypt your files, making your efforts simply useless. Thus, it is recommended that you trust this task to some professional security software which will automatically locate and remove every bit of malware that it finds on your computer. Software like Fortect should be perfect for this purpose.

Step 2. Download Cry128 decrypter from Emsisoft

The important thing you should remember is not to buy the decryption key from the virus creators. They will only use your money for some evil cause, while you will have no guarantee that your data will be returned. Instead go to the official Emsisoft website and download the Cry128 decrypter for free. You can speed up the download by clicking this link. Be careful not to obtain any descryption software from unreputable sources! Such tools may do more harm than benefit to your computer.

Step 3: Cry128 decrypter in action

  1. For the Cry128 decrypter to work, you will first have to submit the application with one healthy file and its encrypted version. By comparing the two, the software will automatically extract the private decryption key. Using this key decrypter will recover the rest of your files.
  2. Drag and drop the two selected files in the indicated area of the Decrypter window.
  3. After the key extraction process is done, click OK next to the pop-up saying “Decryption key found”.
  4. Agree with the “Licence terms” in the following window by clicking OK.
  5. When you complete the above-indicated steps, you finally will land on a decryption window. Here, select the partition(s) you want to decrypt. Additional locations can be added by clicking the “Add Folder” button.
  6. Once you’ve selected the desired files or folders, click “Decrypt” button and initiate the decryption process.

Recover files and other system components automatically

To recover your files and other system components, you can use free guides by experts. However, if you feel that you are not experienced enough to implement the whole recovery process yourself, we recommend using recovery solutions listed below. We have tested each of these programs and their effectiveness for you, so all you need to do is to let these tools do all the work.

do it now!
recovery software Happiness
do it now!
recovery software Happiness
Compatible with Microsoft Windows Compatible with OS X
Do you have any trouble?
If you are having problems related to FortectMac Washing Machine X9, you can reach our tech experts to ask them for help. The more details you provide, the better solution they will provide you.
Fortect - a patented specialized Windows repair program. It will diagnose your damaged PC. It will scan all System Files, DLLs and Registry Keys that have been damaged by security threats.Mac Washing Machine X9 - a patented specialized Mac OS X repair program. It will diagnose your damaged computer. It will scan all System Files and Registry Keys that have been damaged by security threats.
This patented repair process uses a database of 25 million components that can replace any damaged or missing file on user's computer.
To repair damaged system, you have to purchase the licensed version of Fortect malware removal tool.To repair damaged system, you have to purchase the licensed version of Mac Washing Machine X9 malware removal tool.

Protect your online privacy with a VPN client

A VPN is crucial when it comes to user privacy. Online trackers such as cookies can not only be used by social media platforms and other websites but also your Internet Service Provider and the government. Even if you apply the most secure settings via your web browser, you can still be tracked via apps that are connected to the internet. Besides, privacy-focused browsers like Tor is are not an optimal choice due to diminished connection speeds. The best solution for your ultimate privacy is Private Internet Access – be anonymous and secure online.


Data recovery tools can prevent permanent file loss

Data recovery software is one of the options that could help you recover your files. Once you delete a file, it does not vanish into thin air – it remains on your system as long as no new data is written on top of it. Data Recovery Pro is recovery software that searchers for working copies of deleted files within your hard drive. By using the tool, you can prevent loss of valuable documents, school work, personal pictures, and other crucial files.

About the author
Olivia Morelli
Olivia Morelli - PC & Mac repair expert

Olivia Morelli is a young, but a perspicacious IT expert who is currently just a year away from a Bachelor’s Degree in Software Systems. Her primary passion is cyber security, however, thanks to her detailed understanding of computer networks, operating systems and hardware, she can find a fix for any PC or Mac issue...

Contact Olivia Morelli
About the company Esolutions

Read in other languages

What you can add more about the problem: "How to Recover Encrypted Files Using CRY128 Decrypter?"