Ransomware CryptOn

The CryptOn ransomware was discovered around 2017. Since then, it has had varying nomenclatures, such as Cry9, CRY36, Cry128, Nemesis or X3M. CryptOn is part of the CryptoLocker ransomware family.

CryptOn steals and encrypts the victim’s data. In this way the group applies double extortion, which consists of threatening the victim with the publication of the data if the ransom is not paid in the given time.

Access to the victim’s environment can take place manually via RDP (Remote Desktop Protocol), allowing remote access to a target machine, as well as through e-mail campaigns that carry malicious attachments or links.

CryptOn ransomware analyzes mapped network drives and the hosts it is connected to for access to folders and documents during execution. The files are then renamed and encrypted using the RSA-2048 and AES-256 algorithms.

CryptOn uses a simple but long pattern to rename the infected files. All infected files are given an extension consisting of the original file name, the victim ID and the email address to send the proof of payment for the ransom, with this structure ”[original_file_name] .id- [victim ID] _steaveiwalker@india.com_”.

After encryption, the CryptOn ransomware generates a ransom note file called ”’HOWTODECRYPTFILES.html”.

From that moment the victim is faced with the need to make an important choice. Pay the ransom and fund future cybercriminal attacks or find a competent company that can recover his data.

Recover files encrypted by Crypton ransomware

Digital Recovery has been in the data recovery business for 23 years. We specialize in recovery of data encrypted by ransomware and have helped hundreds of companies get back up and running.

Over the years, we have developed unique solutions for recovering encrypted files on databases, virtual machines, RAID systems, servers, and other storage devices.

Secrecy and protection are part of our daily vocabulary. We also have a Non-Disclosure Agreement (NDA) for all our customers.

At Digital Recovery, distance is not an issue. We are able to perform the recovery of encrypted data remotely.

For these reasons, Digital Recovery stands as the clear answer to the problem. Contact us and get your data recovered.

We are always online

Please fill out the form, or select your preferred contact method. We will contact you to start recovering your files.

Latest insights from our experts

Recuperar Ransomware Makop

Makop Ransomware

Makop ransomware has been expanding through its affiliate program, RaaS (Ransomware as a Service), a tactic that aims to seek partners to carry out attacks

Recuperar Ransomware BlogXX

Ransomware BlogXX

The BlogXX ransomware group recently emerged with the theft of patient data from Mediabank, an Australian health insurance company, on October 12. According to authorities,


Ransomware Pozq

The Pozq ransomware was recently discovered after a sample submission on VirusTotal. After some analysis, evidence was highlighted that Pozq may have a relationship with


Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.