{"id":6358,"date":"2022-02-07T17:36:09","date_gmt":"2022-02-07T08:36:09","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=6358"},"modified":"2022-03-30T17:38:13","modified_gmt":"2022-03-30T08:38:13","slug":"free-decryptor-released-by-avast-for-targetcompany-ransomware-victims","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/free-decryptor-released-by-avast-for-targetcompany-ransomware-victims\/","title":{"rendered":"Free decryptor released by Avast for TargetCompany ransomware victims"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6358\" class=\"elementor elementor-6358\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-83868da elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"83868da\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-19a5da3\" data-id=\"19a5da3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c3d130 elementor-widget elementor-widget-text-editor\" data-id=\"1c3d130\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Monday 7<sup>th<\/sup> of February 2022, Avast, a Czech cybersecurity software firm released a free decryption tool for TargetCompany ransomware victims. Although Avast has warned that the decryptor can only be used under certain circumstances as the process of using this decryptor is resource intensive and time-consuming. The TargetCompany ransomware decryptor works by cracking the password after comparing an encrypted file with its original unencrypted version.<\/p><p>&#8220;During password cracking, all your available processor cores will spend most of their computing power to find the decryption password. The cracking process may take a large amount of time, up to tens of hours&#8221; \u2013 Avast.<\/p><p>Although Avast has stated this process only need to be done once per each device encrypted by TargetCompany ransomware as the decryptor wizard allows for previously cracked encryption passwords to be entered by selecting the &#8220;I know the password for decrypting files.&#8221; The wizard also has the feature of creating a backup of the encrypted files just in case, anything goes wrong during the decryption process.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Monday 7th of February 2022, Avast, a Czech cybersecurity software firm released a free decryption tool for TargetCompany ransomware victims. Although Avast has warned that the decryptor can only be used under certain circumstances as the process of using this decryptor is resource intensive and time-consuming. The TargetCompany ransomware decryptor works by cracking the password after comparing an encrypted<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":6363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,10,12,2,1],"tags":[],"class_list":["post-6358","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-latest_vulnerabilities","category-read_article","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2022\/03\/Picture1-5.jpg?fit=1379%2C920&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6358"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=6358"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6358\/revisions"}],"predecessor-version":[{"id":6366,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6358\/revisions\/6366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/6363"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=6358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=6358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=6358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}