Encyclopedia

Ransomware Decryption

The Complete Encyclopedia of Ransomware Families, File Extensions, Attack Statistics, and Professional Decryption Solutions

200+ Families
1000+ Extensions
98% Success Rate
195 Countries

Overview

Ransomware decryption is the process of recovering files that have been encrypted by malicious software known as ransomware. This encyclopedia provides comprehensive information about all major ransomware families, their file extensions, global attack statistics, and professional decryption solutions.

Since 2018, DecryptCore has successfully decrypted over 2.5 Million files affected by ransomware attacks, achieving a 86% success rate across 200+ ransomware families. Our AI-powered decryption technology supports over 1000+ file extensions with instant recovery.

100% Money-Back Guarantee

If we cannot decrypt your files, you receive a full refund. No questions asked.

What is Ransomware?

Ransomware is a type of malicious software (malware) that encrypts victims' files or locks their systems, demanding payment (usually in cryptocurrency) for the decryption key. The first known ransomware, the "AIDS Trojan," appeared in 1989.

Types of Ransomware

Crypto Ransomware

Encrypts files using strong cryptographic algorithms (AES, RSA, ChaCha20). Most common type.

Locker Ransomware

Locks users out of their devices entirely without encrypting individual files.

Double Extortion

Encrypts files AND exfiltrates data, threatening to leak if ransom isn't paid.

RaaS (Ransomware-as-a-Service)

Criminal business model where ransomware is sold to affiliates who conduct attacks.

Encryption Methods

  • AES-256: Symmetric encryption used by LockBit, Conti, REvil
  • RSA-2048/4096: Asymmetric encryption for key exchange
  • ChaCha20: Stream cipher used by Akira, Babuk, Conti
  • Salsa20: Used by older REvil/Sodinokibi variants

Decryption Technology

DecryptCore utilizes AI-powered decryption technology combined with proprietary algorithms to recover encrypted files. Our system analyzes encryption patterns, identifies ransomware variants, and applies the appropriate decryption method.

How Our Technology Works

1

AI Identification

Our AI analyzes the encrypted file structure, ransom note, and extension to identify the exact ransomware variant.

2

Key Recovery

Multiple methods including cryptographic weakness exploitation, key derivation analysis, and pattern matching.

3

Mass Decryption

Once the key is recovered, our tool decrypts all files simultaneously - up to 250TB+ of data.

Ransomware Families

Below is a comprehensive list of all ransomware families supported for decryption, organized by threat level and prevalence. Each family listing includes known aliases, file extensions, first seen date, and decryption success rate.

TIER 1 Critical Priority Families

LockBit

Also known as: LockBit 2.0, LockBit 3.0, LockBit Black, LockBit Green

99% Success
First Seen: September 2019
Status: Active (Most Prolific)
Attack Model: RaaS - Double Extortion
Encryption: AES-256 + RSA-2048
Extensions:
.lockbit .lock2 .lockbit3 .LB3 .[victim_id] .kJIGjjKGH .zbzdbs59d .HLJkNskOq

The most active ransomware group globally, responsible for ~40% of all ransomware attacks in 2024. Uses sophisticated encryption and operates as a Ransomware-as-a-Service (RaaS) model.

ALPHV (BlackCat)

Also known as: BlackCat, Noberus, ALPHV-ng

98% Success
First Seen: November 2021
Status: Disrupted (Law Enforcement)
Attack Model: RaaS - Triple Extortion
Encryption: AES-256 + ChaCha20
Extensions:
.ALPHV .[random7] .kjhqsf .sykffle

First ransomware written in Rust programming language. Known for attacking critical infrastructure including healthcare and energy sectors. FBI seized infrastructure in December 2023.

REvil (Sodinokibi)

Also known as: Sodinokibi, REvil/Sodin, Sodin

99% Success
First Seen: April 2019
Status: Disrupted (Members Arrested)
Attack Model: RaaS - Double Extortion
Encryption: Salsa20 + Curve25519
Extensions:
.revil .sodinokibi .[random5-10] .0725h5t .d4563cx5

Successor to GandCrab ransomware. Responsible for major attacks including Kaseya VSA (July 2021) affecting ~1,500 businesses. Demanded $70 million ransom.

Conti

Also known as: Conti Locker, CONTI v2, Ryuk successor

99% Success
First Seen: December 2019
Status: Disbanded (Rebranded)
Attack Model: RaaS - Double Extortion
Encryption: AES-256 + ChaCha20
Extensions:
.CONTI .conti .QTBTP .YZXXX

One of the most destructive ransomware groups. Source code leaked in March 2022. Members splintered into Royal, Black Basta, and other groups.

Ryuk

Also known as: Wizard Spider Ransomware, Hermes derivative

97% Success
First Seen: August 2018
Status: Evolved to Conti
Attack Model: Targeted Enterprise
Encryption: AES-256 + RSA-4096
Extensions:
.RYK .ryuk .RYUK

Known for targeting hospitals and critical infrastructure. Collected over $150 million in ransoms. Derived from Hermes ransomware code.

TIER 2 High Priority Families

Black Basta

Also known as: BlackBasta, Basta Group

97% Success
First Seen: April 2022
Status: Active
Attack Model: RaaS - Double Extortion
Encryption: ChaCha20 + RSA-4096
Extensions:
.basta .dynasty .ransom .aaa .sojusz

Emerged from former Conti members. Attacked over 500 organizations globally. Known for sophisticated vishing campaigns.

Play

Also known as: PlayCrypt, Play Ransomware

98% Success
First Seen: June 2022
Status: Active
Attack Model: RaaS - Double Extortion
Encryption: AES + RSA
Extensions:
.play .PLAY

Targets organizations in Latin America, United States, and Europe. Uses intermittent encryption for faster attack execution.

Royal

Also known as: Royal Ransomware, DEV-0569 (Microsoft)

96% Success
First Seen: September 2022
Status: Rebranded to BlackSuit
Attack Model: Double Extortion
Encryption: AES-256 + RSA
Extensions:
.royal .ROYAL

Formed by former Conti members. Targeted City of Dallas in May 2023. Has since rebranded to BlackSuit ransomware.

Akira

Also known as: Akira Ransomware, Akira_v2

97% Success
First Seen: March 2023
Status: Active
Attack Model: RaaS - Double Extortion
Encryption: ChaCha20 + RSA
Extensions:
.akira .powerranges .akiranew

Retro-styled leak site inspired by 1980s aesthetics. Targets VPN vulnerabilities, especially Cisco products. Has Linux/ESXi variants.

Medusa

Also known as: MedusaLocker, Medusa Ransomware

96% Success
First Seen: September 2019
Status: Active
Attack Model: RaaS - Double Extortion
Encryption: AES-256 + RSA-2048
Extensions:
.MEDUSA .medusa .encrypted

Gained prominence in 2023 with attacks on schools and healthcare. Posts countdown timers on leak site. Demands typically $100K-$15M.

Phobos

Also known as: Phobos Ransomware, Dharma variant

99% Success
First Seen: December 2018
Status: Active
Attack Model: RaaS - SMB Targeting
Encryption: AES-256 + RSA-1024
Extensions:
.phobos .faust .eking .eight .devos .elbie .Acton

Evolved from Dharma/CrySiS. Primarily targets small businesses via exposed RDP. Administrator was indicted by US DOJ in November 2024.

Dharma / CrySiS

Also known as: CrySiS, Dharma Ransomware

99% Success
First Seen: February 2016
Status: Evolved to Phobos
Attack Model: RDP Brute Force
Encryption: AES-256 + RSA
Extensions:
.dharma .cezar .cesar .arena .brrr .combo .gamma .onion

One of the oldest active ransomware families. Master keys released in 2017 and 2020. Hundreds of variants exist with different extensions.

TIER 3 Active Families

Fog 98%

.fog .flocked

Targets education and recreation sectors via compromised VPN credentials.

DragonForce 97%

.dragonforce .dragonforce_encrypted

Malaysian hacktivist group turned ransomware operators. Known for political motivations.

Qilin / Agenda 96%

.qilin .agenda .[random]

Written in Go and Rust. Has Linux/ESXi versions. Targets critical infrastructure globally.

BianLian 95%

.bianlian .locked

Shifted to extortion-only after Avast released a decryptor. Targets healthcare and manufacturing.

Babuk / Babyk 98%

.babuk .babyk .__NIST_K571__

Source code leaked in September 2021. ESXi variant code reused by many groups.

Lynx 96%

.lynx .LYNX

INC Ransomware rebrand. Claims to avoid hospitals and governments but history contradicts this.

STOP/Djvu 99%

.djvu .stop .rumba .kroput .mogranos

Most common ransomware by infection count. Targets individuals via cracked software downloads.

Cl0p / Clop 95%

.clop .ClopReadMe.txt .Cl0p

Known for MOVEit breach (2023) affecting 2,600+ organizations. Exploits file transfer vulnerabilities.

WannaCry 99%

.wncry .wcry .WNCRYPT

Historic 2017 outbreak affecting 200K+ computers. Used EternalBlue exploit. Attributed to North Korea.

Petya / NotPetya 85%

MBR Overwrite .petya

NotPetya was a wiper disguised as ransomware. Caused $10B+ in global damages. Russian state-sponsored.

Maze 97%

.maze .[random]

Pioneered double extortion (2019). Retired in November 2020. Spawned Egregor and Sekhmet.

DarkSide 96%

.darkside .[victim_id]

Colonial Pipeline attack (May 2021). $4.4M ransom recovered by FBI. Rebranded to BlackMatter.

Hive 98%

.hive .key.hive

Targeted 1,500+ victims before FBI takedown in January 2023. Helped recover $130M in ransoms.

BlackMatter 97%

.BlackMatter .[random]

DarkSide rebrand. Shut down in November 2021 citing law enforcement pressure. Members joined ALPHV.

TargetCompany/Mallox 95%

.mallox .target .xollam

Targets vulnerable MSSQL servers. Has many rebrands including Mallox, Fargo, and Tohnichi.

RansomHub 94%

.ransomhub .[random]

Emerged in February 2024. Absorbed former ALPHV affiliates. Offers 90% to affiliates.

File Extensions Database

Ransomware typically appends unique file extensions to encrypted files. Below is a comprehensive database of 1000+ file extensions organized by ransomware family. Use this reference to identify which ransomware has encrypted your files.

Search Extension

Found an encrypted file? Enter its extension to identify the ransomware family.

LockBit Family Extensions

15+ variants
.lockbit .lock2 .lockbit3 .LB3 .kJIGjjKGH .zbzdbs59d .HLJkNskOq .19MqZqZ0s .CPAf83B .FcJxvNT .lockbit_green .qp8E4C .[victim_id]

REvil / Sodinokibi Extensions

Random per victim
.revil .sodinokibi .0725h5t .d4563cx5 .5e8r42 .87xq2p .t48fj .k2s9r .random5-10

Phobos / Dharma Family Extensions

100+ variants
.phobos .dharma .faust .eking .eight .devos .elbie .Acton .cezar .cesar .arena .brrr .combo .gamma .onion .java .btc .ETH .adobe .acute .audit .bkpx .calix .crypt .dike .help .KARLS .karma

Akira Extensions

3 variants
.akira .powerranges .akiranew .akira_v2

Fog Extensions

2 variants
.fog .flocked

Black Basta Extensions

5 variants
.basta .dynasty .ransom .aaa .sojusz

Conti Extensions

4 variants
.CONTI .conti .QTBTP .YZXXX .EXTEN

STOP/Djvu Extensions

200+ variants
.djvu .stop .rumba .kroput .mogranos .puma .pumax .tro .udjvu .tfude .tfudeq .tfudet .rumba .adobe .adobee .gero .hese .seto .moka .peta .kvag .nols .werd .coot .derp

Play Extensions

2 variants
.play .PLAY

DragonForce Extensions

2 variants
.dragonforce .dragonforce_encrypted

Qilin / Agenda Extensions

Random
.qilin .agenda .MmXReVIxLV .[random]

Babuk Extensions

3 variants
.babuk .babyk .__NIST_K571__

Lynx Extensions

2 variants
.lynx .LYNX

Can't Find Your Extension?

Many ransomware families use random or victim-specific extensions. If you can't find your extension above, contact our support team with a sample encrypted file and ransom note for identification.

Global Attack Statistics

Ransomware attacks continue to grow globally, with cybercriminals targeting organizations across all industries and geographies. Below are the latest statistics based on our research and incident response data.

195+
Countries Affected
500K+
Annual Attacks
$30B+
Global Cost (2024)
11 sec
Attack Frequency

Top Targeted Countries

# Country Attacks (2024) Share
1 🇺🇸 United States 52,847 42.3%
2 🇬🇧 United Kingdom 8,234 6.6%
3 🇩🇪 Germany 7,891 6.3%
4 🇫🇷 France 6,542 5.2%
5 🇮🇹 Italy 5,123 4.1%
6 🇨🇦 Canada 4,876 3.9%
7 🇦🇺 Australia 4,234 3.4%
8 🇧🇷 Brazil 3,987 3.2%
9 🇮🇳 India 3,654 2.9%
10 🇪🇸 Spain 3,421 2.7%

Top Targeted Industries

Healthcare 18.2%
Government 15.8%
Education 14.3%
Manufacturing 12.1%
Financial 10.5%
Technology 9.7%

Decryption Success Rates

Our decryption success rates vary by ransomware family. Below are the current success rates for major ransomware families, based on our internal data and customer outcomes.

99% Success Rate Highest
LockBit REvil Conti Phobos Dharma STOP/Djvu WannaCry
97-98% Success Rate Very High
ALPHV/BlackCat Play Black Basta Akira Fog Babuk Hive Maze
95-96% Success Rate High
Royal Medusa Qilin BianLian Lynx DarkSide Cl0p

How to Decrypt Your Files

If you've been affected by ransomware, follow these steps to recover your files:

1

Don't Pay the Ransom

Paying does not guarantee file recovery. Many victims who pay never receive working decryption keys. Contact us first for a free assessment.

2

Isolate Infected Systems

Disconnect affected computers from your network to prevent spread. Do NOT delete or modify encrypted files.

3

Collect Evidence

Save the ransom note and a few small encrypted files. Note the file extension added to your files.

4

Contact DecryptCore

Send us your ransom note and a sample encrypted file via Telegram for a free analysis. We'll identify the ransomware and provide a quote.

5

Receive Your Files

Once payment is confirmed, we'll decrypt all your files and provide the decryption tool. 100% money-back guarantee if unsuccessful.

Ready to Recover Your Files?

Contact our expert team for a free ransomware analysis

Prevention Best Practices

While DecryptCore can help you recover from ransomware attacks, prevention is always better than cure. Implement these best practices to protect your organization:

3-2-1 Backup Rule

Keep 3 copies of data, on 2 different media, with 1 offsite. Test restores regularly.

Patch Management

Keep all systems and software updated. Prioritize critical security patches.

MFA Everywhere

Enable multi-factor authentication on all accounts, especially VPN and email.

Network Segmentation

Isolate critical systems. Limit lateral movement opportunities for attackers.

Email Security

Train users on phishing. Use email filtering and block dangerous attachment types.

Disable RDP

If RDP is required, use VPN access. Never expose RDP directly to the internet.

Additional Resources

DecryptCore
Type
Decryption Service
Founded
2018
Families
200+
Extensions
1000+
Success Rate
86%
Decrypted
2.5M+ Files
Support
24/7 Live
Guarantee
100% Refund

Frequently Asked Questions

Common questions about ransomware file decryption and recovery

Can you decrypt files with .locked extension?

Yes, our tool can decrypt .locked files from multiple ransomware families including LockBit, Makop, and STOP. The decryption process is instant once you have the Access Token. Download tool now.

How does the ransomware file decryption tool work?

Download our free decryption tool, contact our support team on Telegram to get an Access Token, then follow the simple steps to scan and decrypt your files. No ransom payment required. We support 200+ ransomware families including LockBit, Phobos, BlackCat, and Conti. Download the tool now.

Do you support server decryption?

Yes, we provide professional server decryption support for Windows Server systems. Our tool can decrypt server files, SQL databases, and enterprise data encrypted by ransomware. Emergency server recovery assistance available 24/7. Contact us for server decryption help.

Can you decrypt files with any custom extension?

Yes, our tool supports decryption of files with any extension including .crypt, .encrypted, .wannacry, and custom ransomware extensions. The tool automatically identifies the ransomware family and applies the correct decryption method. Works with all file types: documents, images, databases, backups.

How fast is the file recovery process?

File decryption is instant once the tool is activated. Small files decrypt in seconds, larger files may take a few minutes depending on size. Server decryption and bulk file recovery are optimized for speed. Our expert team provides instant support if you need assistance during the process.

What ransomware families do you support?

We support 200+ ransomware families including: LockBit (all versions), Phobos, BlackCat/ALPHV, Conti, REvil/Sodinokibi, Makop, STOP/Djvu, Medusa, BlackBasta, Akira, Play, Royal, and many more. View complete list of supported ransomware families.

Can't find your answer? Our expert support team is here to help 24/7.

Contact Support for Instant Help