Everbe 1.0 and InsaneCrypt belong to a family of malware that was spun out of a completely open source. This is why this family of ransomware has spread so quickly and has been distributed around in the form of spam. As a result, Remote Desktop Services was hacked into and many of these were on the lookout for ransomware removal services.
The good news though is that all of these variants of the same source code can be easily decrypted for an effective ransomware removal. Micheal Gillespie has come up with a decryptor called Insane Crypt Everbe Decryptor.
If you wish to use this decryptor for your ransomware removal purposes, then all you need is the encrypted and decrypted version of the same file. An easy way of doing this is just using the sample pictures in your Windows OS and encrypting one of the .jpeg files with the malware.
One thing we need to mention here is that there are so many variants of Everbe 1.0 and InsaneCrypt out there that it’s difficult to keep track of them. We can provide you with a few of the known variants and these include:
- .[email].insane
- .[email].DEUSCRYPT
- .[email].deuscrypt
- .[email].Tornado
- .[email].twist
- .[email].everbe
- .[email].embrace
- .[email].pain
- .[email].volcano
Once you’ve matched your problem with the known variants out there, you can go ahead and download the decryptor. The problem, however, is that you cannot encrypt variants that don’t belong to the same family. One common way of identifying these variants is that these variants will definitely feature .insane, .DEUSCRYPT, .deuscrypt, .Tornado, .twist, .everbe, .pain, .volcano, or .embrace in their respective extensions.
If your problem matches these extensions, then you’re in luck! Get yourself the Insane Crypt Everbe Decryptor right away.