Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Makop-Oled Ransonware (.makop, .origami, .tomas, .zbw. mkp) Support Topic


  • Please log in to reply
150 replies to this topic

#16 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 09 March 2020 - 04:09 PM

Is there a hope to recover the infected files ?

Not at this time. Demonslay335 already stated it is secure and I advised that usually means the key is unique (specific) for each victim and generated in a secure way that cannot be brute-forced.
 


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


BC AdBot (Login to Remove)

 


#17 bilu1984

bilu1984

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:07:45 AM

Posted 19 March 2020 - 08:50 AM

Hi, i have the same problem with makop, victim started 18/03/20



#18 Guest_mufyto_*

Guest_mufyto_*

  •  Avatar image
  • Guests
  • OFFLINE
  •  

Posted 21 March 2020 - 05:41 AM

Me infected yesterday. bp.lst.[XXXXXXXX].[modeturbo@aol.com].makop

 

 

Any solution to uncrypt? I think that i'm bleeped...

 

Possible to restore the files, to a stat previous without backup? Like programs recuva, or something like this?

 

 

Anyone try to pay, with success for decrypt?


Edited by mufyto, 21 March 2020 - 05:47 AM.


#19 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA

Posted 21 March 2020 - 07:20 AM

As already noted, it is secure and not decryptable.

 

In regards to paying the ransom and dealing with or negotiating with the malware developers, read my comments about victim experiences in this topic.

 


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#20 Guest_mufyto_*

Guest_mufyto_*

  •  Avatar image
  • Guests
  • OFFLINE
  •  

Posted 21 March 2020 - 08:41 AM

Thanks for your answer. And its possible to restore the files with recuva or stella data recovery?

As already noted, it is secure and not decryptable.

 

In regards to paying the ransom and dealing with or negotiating with the malware developers, read my comments about victim experiences in this topic.

 



#21 Demonslay335

Demonslay335

    Ransomware Hunter


  •  Avatar image
  • Security Colleague
  • 4,770 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:01:45 AM

Posted 21 March 2020 - 09:20 AM

Doesn't hurt to try the free versions. Slim chance, but some people get lucky with a few files in rare cases.


logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic]

ransomnotecleaner-25.png RansomNoteCleaner - Remove Ransom Notes Left Behind [Support Topic]

cryptosearch-25.pngCryptoSearch - Find Files Encrypted by Ransomware [Support Topic]

If I have helped you and you wish to support my ransomware fighting, you may support me here.


#22 Guest_mufyto_*

Guest_mufyto_*

  •  Avatar image
  • Guests
  • OFFLINE
  •  

Posted 21 March 2020 - 11:13 AM

Thanks, I'm trying with recuva, but I'haven't got hope to restore the data... Well, i got a backup of 2 years ago...

 

Is there any possibilty in the future, to may decrypt the files?

 

Doesn't hurt to try the free versions. Slim chance, but some people get lucky with a few files in rare cases.



#23 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA

Posted 21 March 2020 - 02:10 PM

We have no way of knowing when or if a free (or legitimate paid for) decryption solution will ever be available and no one can ever guarantee if any ransomware can be decrypted without paying the ransom to the criminals or by paying them. The possibility of decryption depends on a variety of factors as explained here. For now all you can do is backup/save your encrypted data as is and wait for a possible solution...meaning, what seems like an impossibility at the moment (decryption of your data), there is always hope someday there may be a potential solution.

When or if a free (or legitimate paid for) decryption solution is found, that information will be provided in this support topic and victims will receive notification if subscribed to it. In addition, a news article most likely will be posted on the Bleeping Computer front page. Amigo-A (Andrew Ivanov) will also update the applicable Digest Crypto-Ransomware Alphabetical Index.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#24 Guest_mufyto_*

Guest_mufyto_*

  •  Avatar image
  • Guests
  • OFFLINE
  •  

Posted 21 March 2020 - 02:21 PM

Thank you for the answer. I contact to the criminal, and ask for 6000 $. Won't pay of sure. I've got an old backup.

We have no way of knowing when or if a free (or legitimate paid for) decryption solution will ever be available and no one can ever guarantee if any ransomware can be decrypted without paying the ransom to the criminals or by paying them. The possibility of decryption depends on a variety of factors as explained here. For now all you can do is backup/save your encrypted data as is and wait for a possible solution...meaning, what seems like an impossibility at the moment (decryption of your data), there is always hope someday there may be a potential solution.

When or if a free (or legitimate paid for) decryption solution is found, that information will be provided in this support topic and victims will receive notification if subscribed to it. In addition, a news article most likely will be posted on the Bleeping Computer front page. Amigo-A (Andrew Ivanov) will also update the applicable Digest Crypto-Ransomware Alphabetical Index.


Edited by mufyto, 21 March 2020 - 02:24 PM.


#25 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:11:45 PM

Posted 21 March 2020 - 02:27 PM

As with most ransomware your best defense is back up, back up, and more back up on a regular basis and the best solution for dealing with encrypted data after an infection is to restore from backups.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#26 Guest_mufyto_*

Guest_mufyto_*

  •  Avatar image
  • Guests
  • OFFLINE
  •  

Posted 21 March 2020 - 02:44 PM

Yes, but here, i made the big mistake, that the other backups, was plugged on the server.... Kill me.. But i've got another physical disks olders.

As with most ransomware your best defense is back up, back up, and more back up on a regular basis and the best solution for dealing with encrypted data after an infection is to restore from backups.



#27 bdft

bdft

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  

Posted 21 March 2020 - 06:52 PM

Hi

My server was hacked this night, i found text file with this forum... All my services down and all my employees was infected by covid... please help me !

Sample file : produit.asp.[30D6B07F-W].makop

How to decrypt these files?

Ben



#28 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 21 March 2020 - 07:06 PM

As already noted, it is secure and not decryptable.

.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif


#29 bdft

bdft

  •  Avatar image
  • Members
  • 4 posts
  • OFFLINE
  •  

Posted 21 March 2020 - 07:13 PM

ok... is it possible to use data recovery software? backups are too old ... 



#30 quietman7

quietman7

    Bleepin' Gumshoe


  •  Avatar image
  • Global Moderator
  • 61,920 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:01:45 AM

Posted 21 March 2020 - 07:27 PM

In some cases the use of file recovery software such as R-Studio, Recuva or Photorec may be helpful to recover some of your original files but there is no guarantee that it will work. However, it never hurts to try in case the malware did not do what it was supposed to do. It is not uncommon for ransomware infections to sometimes fail to delete shadow copy snapshots or add an extension but fail to encrypt all data especially if the encryption process was interrupted by the victim (i.e. shutting down the computer), encountered encryption glitches, involved shoddy malware programming code or was hindered by installed security software. Although it never hurts to try this approach, in the end you still may have no choice but to backup/save your encrypted data as is and wait for a possible solution at a later time. Data recovery does not decrypt encrypted data.

Note: Some ransomware such as STOP Djvu, Ryuk and a few others only encrypts part of the file for speed (first so many KB's especially if it is very large) so it does not actually read/write/encrypt the entirety of data. This partial encryption often results in file corruption and renders the encrypted data useless since the encryption is usually irreversible for these files...the encryption code overwrites part of the file with the encrypted data of another part and there is no way to restore the overwritten data as explained here. Since only parts of the file may actually be encrypted, data recovery programs sometimes work to recovery partial files with certain ransomware infections but not with those which overwrite data. With some other types of ransomware, it is even possible to manually recover/reconstruct certain file formats (i.e. .JPG and video files) since the malware only encrypts 150KB of the file as explained here by Demonslay335.

Important Note: The more you use your computer after files are deleted, encrypted or corrupted the more difficult it will be for data recovery programs to recover any deleted, unencrypted and uncorrupted data. The less that is done with the hard drive between the time of the data loss and the attempted recovery, the more likely it is that some or all of the files can be successfully recovered. The more the hard drive with the lost data is used, the less chances of recovery because there is a greater risk that new data can be written to the drive, overwriting and destroying deleted files that could have otherwise been recovered. When you delete a file, its content physically remains intact on the media, but the occupied space becomes marked as free. The next file saved to the disk may overwrite the contents of the deleted file. Therefore, the sooner that data recovery is attempted after a loss the greater the possibility that data can be successfully recovered. It is also very important to make sure that no application (including the recovery program) writes to the drive or partition where the deleted file is located since every new file may overwrite the deleted file.

 

The chances of success also will be greater if the drive is not defragmented and that you install and use a data recovery program on a drive other than the drive you want to recover files from (i.e. second hard drive, separate partition or USB flash drive) otherwise it could overwrite recoverable files. You could also "slave" the original hard drive and install the software on the new drive.


.
.
Microsoft MVP Alumni 2023Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023

Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users