Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

New PClock CryptoLocker Ransomware discovered


  • Please log in to reply
1150 replies to this topic

#1141 brajner

brajner

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:02:18 PM

Posted 15 January 2020 - 05:52 AM

Dear friend it is some time from last update, but i want to ask if somebody dont know if it is still not possible to unlock the files from this kind of ransomware?

 

I have still backed up the data from from 2017, for case of some new possibilities.

 

This is the text from the note:

 

Your personal files encryption produced on this computer: photos, videos, documents, etc.
Encryption was produced using a unique public key RSA-2048 generated for this computer.
 
To decrypt files you need to obtain the private key.
 
If your time is up, or you or your antivirus deleted CryptoLocker from your computer,
and you do not see CryptoLocker window - the latest copy of the key remains our support.
 
To obtain the private key for this computer, you need pay 0.7 Bitcoin (~685 USD)
 
---------------------------------------------------------------------------------------------------
 
Your Bitcoin address:
 
12jD8HBxW43LPJc4iMqQLBdy5zXMUuZS36
 
You must send 0.7 Bitcoin to the specified address and report it to e-mail customer support.
 
In the letter title you must specify your Bitcoin address to which the payment was made.
 
Support e-mail: winkes01@india.com winkes02@india.com
 
Please do not contact customer support with the request to get the key for free.
Such messages will be marked as spam and decryption in the future will be impossible.
 
Thank you for understanding.
 
---------------------------------------------------------------------------------------------------
 
The most convenient tool for buying Bitcoins in our opinion is the site:
 
 
There you can buy Bitcoins in your country in any way you like, including electronic payment systems,
credit and debit cards, money orders, and others.
 
Instructions for purchasing Bitcoins on account localbitcoins.com read here:
 
 
Video tutorial detailing on buying Bitcoins using the site localbitcoins.com here:
 
 
Please check other ways to buy bitcoins:
 
 
 
Also you can use to buy Bitcoins these sites:
 
https://www.bitstamp.net/ - Big BTC exchanger
https://www.coinbase.com/ - Other big BTC exchanger
https://btcdirect.eu/ - Best for Europe
https://coincafe.com/ - Recommended for fast, many payment methods
https://bittylicious.com/ - Good service for Europe and World
 
---------------------------------------------------------------------------------------------------
 
Please do not try to decrypt the files by third-party decryptors, an error that allowed
to decrypt files for free, it has been found and corrected as early as one of the earliest versions.
Decrypt the files for free at the moment is impossible. Do not waste your time!
 
Attention!
 
After 168 hours, we reserve the right to increase the amount of the payment at its discretion.
 
 
 
 
Thank you very much for your help!
Have  a nice day,
Lukas.

Edited by brajner, 15 January 2020 - 06:11 AM.


BC AdBot (Login to Remove)

 


#1142 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,063 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:18 AM

Posted 15 January 2020 - 07:19 AM

No updates that I am aware of... still not decryptable.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#1143 brajner

brajner

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:02:18 PM

Posted 17 January 2020 - 09:05 AM

No updates that I am aware of... still not decryptable.

 

Thank you for your answer! :(


Edited by brajner, 17 January 2020 - 09:05 AM.


#1144 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,063 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:18 AM

Posted 17 January 2020 - 09:12 AM

You're welcome.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#1145 Pacer2

Pacer2

  •  Avatar image
  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:03:18 PM

Posted 01 May 2020 - 02:56 PM

Hey guys,

 

I am sure, there still no way of decryption, right?

 

I am now waiting for 5 years, since all my personal photos have been encrypted by this sort of malware.

 

Wouldn't this have been time enough for trying a brute force decryption?

 

Does someone know how long brute force decryption could take? Is there a software available for that?

 

Thanks to all!



#1146 Shamil55

Shamil55

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:03:18 PM

Posted 01 May 2020 - 03:02 PM

Hey guys,

 

I am sure, there still no way of decryption, right?

 

I am now waiting for 5 years, since all my personal photos have been encrypted by this sort of malware.

 

Wouldn't this have been time enough for trying a brute force decryption?

 

Does someone know how long brute force decryption could take? Is there a software available for that?

 

Thanks to all!

Same here... I have been waiting for 5 years now with all my encrypted personal files. :(



#1147 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,063 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:18 AM

Posted 01 May 2020 - 04:37 PM

All crypto malware ransomware use some form of encryption algorithms and most of them are secure. Thus, the possibility of decryption depends on what algorithm the creator utilized for encryption, the type and strength of encryption, the thoroughness of the malware creator, discovery of any flaws and sometimes just plain luck. Reverse engineering the malware itself does not guarantee experts will be able to crack it especially if there isn't a known flaw. Without the master private RSA key that can be used to decrypt your files, decryption is impossible. That usually means the key is unique for each victim and generated in a secure way that cannot be brute-forced.

Brute forcing involves systematically checking all possible key combinations until the correct key or password is found. The key length used in the encryption determines the practical feasibility of performing a brute-force attack...longer keys are exponentially more difficult to crack than shorter ones. Brute forcing the decryption key is not a feasible option (not possible) with current technology and quantum computers, due to how the keys are generated using complicated math operations, an infinite number of possibilities to try and the length of time required to break an RSA or AES encryption key.  

Ransomware Encryption: The math, time and energy required to brute-force an encryption key

According to Emisoft's CTO, Fabian Wosar

...reverse engineering...without having discovered a flaw would require access to a quantum computer that is capable of running Shor's algorithm. The highest number ever factorized using said algorithm and quantum computers is 21, which is just short of the 307 digits that would be required to break Dharma."

 

Dr.Web: Encryption ransomware - Threat No. 1

According to Doctor Web’s statistics, the probability of restoring corrupted files is roughly 1%...That means that most of user data has been lost for good!.

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#1148 x7q

x7q

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:05:18 PM

Posted 19 April 2021 - 01:19 AM

Hi. 12/22/2016 caught the virus PClock i don't know which version. I reinstalled windows. What can I do now to recover files and find out which version PClock? I guess the version 3 or 4



#1149 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,063 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:18 AM

Posted 19 April 2021 - 08:49 AM

PClock (and PClock2) is a Cryptolocker copycat that does not append an obvious extension to the end of encrypted data filenames, use a filemarker or always leave a ransom note making it difficult to identify. If PClock drops a ransom note, it will have names like Your files are locked !.txt and Your files are locked !!!!.txt. When PClock encrypts data, it will store the list of encrypted files and malware executables locally in the following locations.

%APPDATA%WinDskwindsk.exe – The malware executable
%APPDATA%WinDskwindskwp.jpg – The wallpaper generated by the malware
%DESKTOP%CryptoLocker.lnk – A shortcut to the malware executable
%USERPROFILE%enc_files.txt – The list of encrypted files

These are some examples.

 sysgop.exe
 syspoz.exe
 sysras.exe
 wposys.exe
 gadsys.exe
 wxdsys.exe
 en_files.txt
 en_gfiles.txt
 wp.jp

The Emsisoft PClock Decrypter created for earlier variants will not work for later variants. Fabian explains why in Post #987. Also read...We released a blog post about the newest variants and why we are unable to help.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#1150 x7q

x7q

  •  Avatar image
  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:05:18 PM

Posted 19 April 2021 - 11:28 AM

But what does the enc_files.txt list look like, can I try to create it myself manually? I probably won't find a ransom note because I reinstalled windows



#1151 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,063 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:18 AM

Posted 19 April 2021 - 01:57 PM

New Ransomware Alert: CryptoLocker copycat PClock discovered

Every files the malware tries to encrypt is recorded within a file named “enc_files.txt” located in the victim’s profile folder.

There is ongoing discussion in this topic where victims can post comments, ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users