about

ID Ransomware

Upload a ransom note and/or sample encrypted file to identify the ransomware that has encrypted your data.

What is Ransomware? Ransomware is a form of malicious software

Ransomware is a form of malicious software (or malware) that, once it's taken over your computer, threatens you with harm, usually by denying you access to your data. The attacker demands a ransom from the victim, promising — not always truthfully — to restore access to the data upon payment. A ransomware attack can be devasting for any business but you don’t have to be part of the statistics with AntiHack.Me.

Ransomware Facts : Why Prevention is Better Than Cure

1 in 5 companies that paid ransom still lost their data

A Company is compromised with Ransomware every 40 seconds

Total ransomware damage for 2017 is estimated at $5,000,000,000

71% of Companies targeted by ransomware have been compromised.

More than 4,000 ransomware attacks have occurred everyday since 2016

17% of companies halted operations for at least 10 days due to a ransomware attack

Why AntiHack.me?

  • Detailed Reports that clearly defines any backdoor and/or potential loopholes to prevent future Ransomware Attack occurences
  • Quick, Efficient and Effective - Data are recovered quickly using advanced technology and other cutting-edge methods.
  • Experienced Security Researchers and White-hat hackers to ensure optimal success and results.
  • NO DATA, NO FEE - No charges unless we help you recover your data.

Submit a request

to decrypt files compromised by a Trojan.Encoder (Cryptolocker, Cryptowall, Reveton. ExPetya) program that has demanded a ransom from you to decrypt them.

Our engineers will analyse the information you have provided for free. That's right, absolutely free! If decryption is possible, you will only need to pay a flat fee of 999 USD. We understand the pain of losing your precious data and don't wish to benefit (too much) from the suffering of others.

Please attach 3-5 samples of various types of infected files (primarily .doc and .xls documents). If you can, take a screenshot of the ransom message displayed on the infected computer, and attach the screenshot or a text file containing the ransom demand to this request and describe how your system got infected.

IMPORTANT! Do not remove the malicious file that caused your data to become encrypted. It could be vital to recovering your data.