Decrypting files after WannaCash ransomware (.punisher)

Cryakl_punisher

This ransomware, for now, uses software keys for distribution, and this is another big argument in favor of using licensed software.

Typical example

Paths of distribution through hacking through an unprotected (or weakly protected) RDP configuration (Remote Desktop Protocol), unless, of course, ransomware operators decide to purchase the corresponding databases on the darknet.

There is some good news, some versions of this ransomware can be decrypted. If you are affected by this version of WannaCash, and you need help decrypting files, then you need to contact on a forum and prepare logs forrules for making a request.