.cerber3 ransomware attack my files please help me with out paying to ransomware

hi

my files are converted as a extension of .cerber3 which is a encrypted virus and it has attack my files

please help me to decrypt this extension without paying a money to ransomware please help me to recover my files by decryption

 thank you

 

Question Info


Last updated November 27, 2018 Views 1,048 Applies to:
Answer
Answer

See this archived reply from an earlier thrəad:

https://goo.gl/vDMPoc

`~`

Did this solve your problem?

Sorry this didn't help.

Great! Thanks for marking this as the answer.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this response?

Thanks for your feedback.

Answer
Answer

Please see  quietman7's reply in another thread from yesterday on same topic: http://answers.microsoft.com/en-us/protect/forum/protect_other-protect_scanning/how-to-decrypt-cerber3-files/ce6121fa-b36c-4ac6-aa87-41f20b80261b

Copy/paste of above mentioned reply:

QUOTE

Any files that are encrypted with Cerber Ransomware will be renamed with 10 random characters plus the .cerber (i.e. 2C1OlcaXdF.cerber, Ku7dYlcvkj.cerber) or .cerber2 extension (see here) appended to the end of the encrypted data filename and leave files (ransom notes) named DECRYPT MY FILES#.vbs, DECRYPT MY FILES#.txt, DECRYPT MY FILES#.html.

The newest variant of Cerber Ransomware will have a .cerber3 extension appended to the end of the encrypted data filename and leave files (ransom notes) named # HELP DECRYPT #.txt, # HELP DECRYPT #.html, and # HELP DECRYPT #.url.

Trend Micro released a Ransomware File Decryptor for victims of earlier Cerber infections but it has limitations...must be used on the infected machine, may take several hours to complete decryption, some files may be only partially decrypted. However, victims of Cerber Ransomware have reported the decryption tool does not work on cerber3 encrypted files.

In cases where a decryption tool does not work and you do not plan on paying the ransom, the only other alternative is to backup/save your data as is and wait for a possible breakthrough...meaning, what seems like an impossibility at the moment (decryption of your data), there is always hope someday there may be a potential solution so save the encrypted data and wait until that time. Imaging the drive backs up everything related to the infection including encrypted files, ransom notes and registry entries containing possible information which may be needed if a solution is ever discovered.

There is an ongoing discussion in this topic where you can ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.

UNQUOTE


May 4, 2018: I won't participate anymore in MC. Enough is enough.

1 person was helped by this reply

·

Did this solve your problem?

Sorry this didn't help.

Great! Thanks for marking this as the answer.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this response?

Thanks for your feedback.