You are viewing a single comment's thread from:

RE: Matthew Rosenquist, Cybersecuirty Strategist is on Steemit!

Wow, thanks so much for the insight. I'm glad I asked.

So, once you run this software to check the variant of the key - it's simply matter of deploying the key, and you're golden? I'm guessing there is a way to more or less brute force it by simply running a batch file of every key in possession? (which, I'm guessing would would also be just about instantaneous - once all the keys are compiled?)

Sort:  

Fortunately, I have never had to run the tool myself so I don't know how the decryption process works. But I imaging due to the different ways ransomware can work, I assume the decryption process may differ between variants. Check out the How-To guides on the Tools page: https://www.nomoreransom.org/decryption-tools.html

Great, thanks - and thanks again for the input. I'll be looking forward to seeing more of your posts on here. Cheers!

@internets reach out any time! You can follow me on Steemit, Linked-In (where I tend to post throughout the day), and Twitter. Good luck with the ransomware recovery effort.