
If the ransomware has an associated DecryptionTool, a link is provided in the Decryptor column. Usually the first result is the most relevant and it is displayed with the highest confidence percentage (the one with the highest percentage). In this case, the Bitdefender Ransomware Recognition tool displays the possible ransomware families next to an indicator of confidence. In some cases, multiple families of ransomware display similar features. If the ransomware family cannot be identified, the user is informed about this.

If the user provides any encrypted file, NO file content will be submitted to our cloud, as the tool only analyzes the filename and its extension. The content of the ransom note is submitted for analysis to Bitdefender cloud. The application gives a warning if the ransom-note path is not filled in, as the detection accuracy is slightly lower in this case. If none of the fields are filled in, you cannot proceed any further You can choose either option, but the tool needs at least one of the pieces of information to detect which strain of ransomware has encrypted your information. The application has two fields to fill in:Ĭhoose the path to the ransom note file or the path to a folder containing encrypted files.
BITDEFENDER OEM PARTNERS LICENSE
Read and agree to the End User License Agreement Run the BDRansomRecognitionTool.exe and allow it to execute if prompted by an UAC alert. This tool requires an active internet connection. The latest version is always available here:ĭownload the Bitdefender Ransomware Recognition Tool This tool analyzes both the ransom note and the encrypted file samples to identify the strain of ransomware and suggest a decryption tool for the identified family, if such a tool is available.ĭownload the BRR tool and save it somewhere on your computer.

While most ransomware attacks can’t be defeated, Bitdefender constantly creates and updates ransomware decryption tools for families that have either vulnerable encryption algorithms or for which a master decryption key has been leaked. Ransomware has grabbed the headlines ever since 2014. Visit our website to learn more about our Cyber Security Solutions for Your Business: A tool to help ransomware victims find which family and sub-version of ransomware has encrypted their data and then get the appropriate decryption tool, if it exists.


Global Cybersecurity Researcher Liviu Arsene and Senior Manager Andra Cazacu are discussing: Learn the intricate details that Bitdefender’s investigation revealed into such an attack, which targeted a company that deals with high-profile billion-dollar contracts in the real estate industry. Are APT mercenary groups now expanding beyond state-sponsored attacks, into industrial espionage? Traditionally known for delivering highly targeted government-sponsored attacks or targeting organizations for direct financial gain, APT mercenary groups have recently been observed offering their services for industrial espionage by targeting verticals not previously associated with APT-style attacks.
