Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Smock Ransomware ([ID random 8]<email>.SMOCK, .SMOK, .MEHRO, .ciphx) Support


  • Please log in to reply
44 replies to this topic

#31 glicinio

glicinio

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:16 PM

Posted 08 October 2024 - 06:50 AM

Some encrypted files

Attached Files


Edited by glicinio, 08 October 2024 - 06:51 AM.


BC AdBot (Login to Remove)

 


#32 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 411 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:04:16 PM

Posted 08 October 2024 - 07:41 AM

Some encrypted files

Most likely, I can help you



#33 glicinio

glicinio

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:16 PM

Posted 08 October 2024 - 08:37 AM

 

Some encrypted files

Most likely, I can help you

 

can you explain how i decrypt the files??



#34 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 411 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:04:16 PM

Posted 08 October 2024 - 11:35 AM

can you explain how i decrypt the files??

Here are your decrypted files

Attached Files



#35 glicinio

glicinio

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:16 PM

Posted 08 October 2024 - 11:44 AM

wow, nice i have incrypted databases how can i decrypt them

 

thank you in advance



#36 glicinio

glicinio

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:16 PM

Posted 09 October 2024 - 10:58 AM

wow, nice i have incrypted databases how can i decrypt them

 

thank you in advance

 

 

maybe if i pay....



#37 Meg

Meg

  •  Avatar image
  • Members
  • 983 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Netherlands
  • Local time:02:16 PM

Posted 09 October 2024 - 12:48 PM

If you pay you support the malware creators, I believe one of the mods has some information about why you shouldn't pay.


"Imagination is more important than knowledge. Knowledge is limited. Imagination encircles the world." - Albert Einstein


#38 cybercynic

cybercynic

  •  Avatar image
  • Members
  • 2,080 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Somewhere In Time
  • Local time:08:16 AM

Posted 09 October 2024 - 01:14 PM

rivitna is not one of the malware creators, but he can help with decryption in some cases.

glicino should contact him by PM for the possibility of further help, since rivitna  has already been able to decrypt some of his files.

rivitna does not ask for payment.


 


#39 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 411 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:04:16 PM

Posted 09 October 2024 - 01:22 PM

maybe if i pay....

Sorry, I'm not doing decryption anymore.

It takes a lot of time and effort.
I don't have any free time.



#40 glicinio

glicinio

  •  Avatar image
  • Members
  • 7 posts
  • OFFLINE
  •  
  • Local time:02:16 PM

Posted 09 October 2024 - 02:05 PM

 

maybe if i pay....

Sorry, I'm not doing decryption anymore.

It takes a lot of time and effort.
I don't have any free time.

 

No problem, I didn't expect someone to decrypt it, at least for free



#41 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:16 AM

Posted 09 October 2024 - 03:32 PM

As with most ransomware the best solution for dealing with encrypted data after an infection is to restore from backups that have been isolated (offline) to a device not always connected to the network or home computer so they are unreachable. The only reliable way to effectively protect your data and limit the loss with this type of infection is to have an effective backup strategy. Without having safely stored backups to restore from, in most cases your data is likely lost forever.
 
With that said...in cases where there is no free decryption tool (or a previous tool/decryption method no longer works for newer variants), restoring from back ups is not a viable option and file recovery software does not work, the only other alternative to paying the ransom (which is not advisable) even if you can reach the criminals to pay is to backup/save your encrypted data as is and wait for a possible solution at a later time...meaning, what seems like an impossibility at the moment (decryption of your data), there is always hope someday there may be a potential solution.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#42 swissplatipus

swissplatipus

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:03:16 PM

Posted 18 October 2024 - 09:22 AM

I'm a victim too of this SMOKE thing.

While resarching I found the following Website :

 

https://phobosdecryptor.ru/smock-ransomware/

 

They want 500 USDTS !

 

What do you think about ?



#43 Amigo-A

Amigo-A

    Security specialist and Ransomware expert


  •  Avatar image
  • Members
  • 3,119 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bering Strait
  • Local time:06:16 PM

Posted 18 October 2024 - 11:30 AM

What do you think about ?

 

A extortion gang from Ukraine pretends to be Russian extortionists.

The telephone codes +44 belong to the UK. Ingenious! (=super idiocy!)


Edited by Amigo-A, 18 October 2024 - 11:36 AM.

My site: The Digest "Crypto-Ransomware"  + Google Translate 

 


#44 rivitna

rivitna

  •  Avatar image
  • Security Colleague
  • 411 posts
  • ONLINE
  •  
  • Gender:Male
  • Local time:04:16 PM

Posted 18 October 2024 - 12:57 PM

They write about things they don't understand (-:



#45 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 62,740 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:08:16 AM

Posted 18 October 2024 - 04:15 PM

I'm a victim too of this SMOKE thing.
While resarching I found the following Website :
 
https://phobosdecryptor.ru/smock-ransomware/

Ransomware victims should ignore all Internet web searches which provide numerous links to bogus and untrustworthy ransomware removal guides, including Facebook and YouTube videos, many of which falsely claim to have decryption solutions. After expert researchers write about new ransomware variants, junk articles with misinformation are quickly written in order to scare, goad or trick desperate victims into using or purchasing mostly sham removal and decryption software. In some cases, unsuspecting victims may actually be downloading a malicious file or fake decryptor that makes the situation even worst. Only use trusted sources when searching for information.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users