ID Ransomware

Upload a ransom note and/or sample encrypted file to identify
the ransomware that has encrypted your data

...
1 in 5 companies that paid ransom still lost their data
...
1 in 5 companies that paid ransom still lost their data
...
Total ransomware damage for 2017 is estimated at $5,000,000,000
...
71% of Companies targeted by ransomware have been compromised.
...
More than 4,000 ransomware attacks have occurred everyday since 2016
...
17% of companies halted operations for at least 10 days due to a ransomware attack
What is Ransomware? Ransomware is a form of malicious software

At AntiHack.me, Smart Contracts audits are performed by elite White-hat hackers in according to an internal methodology that analyses the functionality and the impenetrability of the smart contract. Basic security audits consist of, but not limited to, code base audit, automated tools security audit, vetting of the Smart Contract terms and functionality and all other forms of neccessary checks that are essential to identify known vulnerabilities etc.

Why AntiHack.me?

Identification and take down of fraudulent phishing sites as soon as they appear.

Quick, Efficient and Effective - Checks are conducted quickly to meet tight deadlines.

Experienced Security Researchers and White-hat hackers to ensure optimal success and results.

Clear Audit Metrics with the option to adjust the testing parameters according to your management and/or your personal preferences.

Submit a request

to decrypt files compromised by a Trojan.Encoder (Cryptolocker, Cryptowall, Reveton. ExPetya) program that has demanded a ransom from you to decrypt them.

IMPORTANT! Do not remove the malicious file that caused your data to become encrypted. It could be vital to recovering your data.

Please attach 3-5 samples of various types of infected files (primarily .doc and .xls documents). If you can, take a screenshot of the ransom message displayed on the infected computer, and attach the screenshot or a text file containing the ransom demand to this request and describe how your system got infected