{"id":31457,"date":"2019-03-22T03:43:17","date_gmt":"2019-03-22T07:43:17","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31457"},"modified":"2019-03-22T03:43:17","modified_gmt":"2019-03-22T07:43:17","slug":"avast-and-emsisoft-release-free-decrypters-for-bigbobross-ransomware","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/03\/22\/avast-and-emsisoft-release-free-decrypters-for-bigbobross-ransomware\/","title":{"rendered":"Avast and Emsisoft release free decrypters for BigBobRoss ransomware"},"content":{"rendered":"\n<p> <br>By\u00a0<a href=\"https:\/\/www.zdnet.com\/meet-the-team\/us\/catalin.cimpanu\/\">Catalin Cimpanu<\/a>\u00a0&#8211; Avast and Emsisoft, two cyber-security firms known for their antivirus products, released today free decrypters that can help victims of the BigBobRoss ransomware recover their files without paying the ransom demand.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/03\/bigbobross-ransom-note.png\" alt=\"\" class=\"wp-image-31458\" width=\"308\" height=\"220\"\/><\/figure><\/div>\n\n\n\n<p>The two decrypters are available for download from the&nbsp;<a href=\"https:\/\/www.avast.com\/ransomware-decryption-tools#bigbobross\" target=\"_blank\" rel=\"noreferrer noopener\">Avast<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/decrypter.emsisoft.com\/bigbobross\" target=\"_blank\" rel=\"noreferrer noopener\">Emsisoft<\/a>&nbsp;sites, respectively.<\/p>\n\n\n\n<p>The ransomware is one of the smaller strains that has been silently infecting victims for the past two months while larger ransomware operations like&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-warning-the-gang-behind-this-virulent-malware-just-changed-tactics-again\/\" target=\"_blank\" rel=\"noreferrer noopener\">GandCrab<\/a>,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ryuk-ransomware-gang-probably-russian-not-north-korean\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ryuk<\/a>,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/city-of-valdez-alaska-admits-to-paying-off-ransomware-infection\/\" target=\"_blank\" rel=\"noreferrer noopener\">BitPaymer<\/a>,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/samsam-ransomware-created-by-iranian-hackers-says-us-doj\/\" target=\"_blank\" rel=\"noreferrer noopener\">SamSam<\/a>, or&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/matrix-has-slowly-evolved-into-a-swiss-army-knife-of-the-ransomware-world\/\" target=\"_blank\" rel=\"noreferrer noopener\">Matrix<\/a>&nbsp;have been grabbing all the headlines.<\/p>\n\n\n\n<p>Emsisoft security researcher Michael Gillespie told\u00a0<em>ZDNet<\/em>\u00a0that the first sighting of BigBobRoss was on January 14, when some victims tried to identify the ransomware via\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/id-ransomware.malwarehunterteam.com\/\" target=\"_blank\">ID-Ransomware<\/a>, a service Gillespie built years ago to help victims determine the name of the ransomware that infected their systems.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.zdnet.com\/article\/avast-and-emsisoft-release-free-decrypters-for-bigbobross-ransomware\/&amp;ct=ga&amp;cd=CAEYACoTNDk0MDY1NTU1NDEyMTgyMDkxNjIaZjk1ZDdkNTc3NTkyZGUyMTpjb206ZW46VVM&amp;usg=AFQjCNFMfJ-MiQ1K8FpN_qna3WT3jR9I8g\">Read more: <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By\u00a0Catalin Cimpanu\u00a0&#8211; Avast and Emsisoft, two cyber-security firms known for their antivirus products, released today free decrypters that can help victims of the BigBobRoss ransomware recover their files without paying the ransom demand. The two decrypters are available for download <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/03\/22\/avast-and-emsisoft-release-free-decrypters-for-bigbobross-ransomware\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-31457","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31457"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31457\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}