Infected with Cerber3? Need to decrypt your files?

What is Cerber3

Cerber3 is newer version of Cerber and Cerber2 ransomware, that is became more complicated. It was discovered and described by AVG malware analyst. New version of this virus adds .cerber3 extension instead of .cerber or .cerber2. Cerber3 virus modifies encrypted filename with randomly generated 10 characters. Authors of Cerber3 demand 0.7154 bitcoins (~$400) for decryption. Malefactors give users 5 day time frame, otherwise ransom amount doubles. Malware has new ransomware note filenames (# HELP DECRYPT #.html, # HELP DECRYPT #.txt, # HELP DECRYPT #.url). Text and html files contain the same message and instructions to pay the ransom, “.url” file opens Cerber3’s payment website in browser. At the moment, there are no free decryptors available, but there are certain manual methods we explained in this article to help you decrypt files. Trend Micro Ransomware Decryptor, that was able to decrypt .cerber files, currently cannot decrypt .Cerber3 files, however, we recommend you to check this page for the updated version. Read the article below to learn how to remove Cerber3 ransomware and decrypt your .Cerber3 files.

Your documents, photos, databases and other important files have been encrypted!
If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.
There is a lost of temporary addresses to go on your personal page below.

Update: Use following service to identify the version and type of ransomware you were attacked by: ID Ransomware. Also check following website for possible decryptor: Emsisoft Decryptors.

сerber3 virus

How Cerber3 infected your PC

Cerber3 uses e-mails to infiltrate users computers. Virus is hidden inside archives with .doc or .xls documents attached to such e-mails. If user downloads this archive and opens .doc or .xls file, it will ask to enable macros. Once uses does it there is no way back because it will soon download small executable and will run it to encrypt files in user folders. Antiviruses have a small chance to catch Cerber3 virus as it is constantly modified. The only way to protect your computer from such threats is use antiviruses with crypto-protection like HitmanPro.Alert with CryptoGuard.

What to do if you are infected with Cerber3 virus?

First of all don’t panic. Follow these easy steps below.

1. Start your computer in Safe Mode with networking. To do that, restart your computer, before your system starts hit F8 several times. This will stop system from loading and will show Advanced boot options screen. Choose Safe mode with networking option from the options list using up and down arrows on your keyboard and hit Enter.
2. Log in to the system infected with the Cerber3 virus. Launch your Internet browser and download a reliable anti-malware program and start a full system scan. Once the scan is complete, review scan results and remove all entries detected.

Recommended Solution:

Norton is a powerful removal tool. It can remove all instances of newest viruses, similar to Cerber3 – files, folders, registry keys.

 

Download Norton*Trial version of Norton provides detection of computer viruses for FREE. To remove malware, you have to purchase the full version of Norton.

Step 2: Remove following files and folders of Cerber3:

Remove following registry entries:


no information

Remove following files:


no information

How to decrypt files infected by Cerber3 (.Cerber3 files)?

Use automated decryption tools

trendmicro cerber ransomware decryptor

There is ransomware decryptor from Trend Micro that may decrypt .Cerber3 files. It is free and may help you restore files encrypted by Cerber3. Download it here:

Download Trend Micro Ransomware File Decryptor

There is currently no other automated decryption tool for Cerber3 files, but that doesn’t mean that you need to pay the ransom. We track the topic and will add any new decryption tool available in this part of the article. Now you can try to use manual methods to restore and decrypt .Cerber3 files.

Decrypt .Cerber3 files manually

Restore the system using System Restore

system restore

Although, latest versions of Cerber3 remove system restore files, this method may help you partially restore your files. Give it a try and use standard System Restore to revive your data.

  1. Initiate the search for ‘system restore
  2. Click on the result
  3. Choose the date before the infection appearance
  4. Follow the on-screen instructions

Roll the files back to the previous version

Previous versions can be copies of files and folders created by Windows Backup (if it is active) or copies of files and folders created by System Restore. You can use this feature to restore files and folders that you accidentally modified or deleted, or that were damaged (in our case – encrypted by Cerber3). This feature is available in Windows 7 and later versions.

windows previous versions

  1. Right-click the file and choose Properties
  2. Open the Previous Version tab
  3. Select the latest version and click Copy
  4. Click Restore

Restore .Cerber3 files using shadow copies

shadow explorer gui

  1. Download and run Shadow Explorer.
  2. Select the drive and folder where your files are located and date that you want to restore them from.
  3. Right-click on folder you want to restore and select Export.
  4. Once the scanning process is done, click Recover to restore your files.

Protect your computer from ransomware

hitmanpro alert with cryptoguard

Most modern antiviruses can protect your PC from ransomware and crypto-trojans, but thousands of people still get infected. There are several programs that use different approach t protect from ransomware and lockers. One of the best is HitmanPro.Alert with CryptoGuard. You may already know HitmanPro as famous cloud-based anti-malware scanner. Check out ultimate active protection software from SurfRight.

Download HitmanPro.Alert with CryptoGuard

Information provided by: Alexey Abalmasov

5 Comments

Leave a Reply

Your email address will not be published. Required fields are marked *