Attention! Victims of the 3nity@tuta.io ransomware

3nity@tuta.io

If you have been affected by this ransomware version (1.6.id) to 03.07.19 don't pay the ransom. With a high degree of probability, decryption is not available to you.

According to our data, law enforcement agencies arrested the server with Cryakl keys. Great news, but the data was stored in a crypto container and there is no information yet whether it can be retrieved.

Intruder, using email for feedback 3nity@tuta.io, did not back up the keys and cannot ensure file decryption even after paying the ransom.

Affected by the previous version (1.5.1.0 doubleoffset) To decrypt the data you need to contact on a forum and prepare logs forrules for making a request.