Fix your pc infected with WannaCry with this free tool

Image of an encrypted pc

The Wannacry malware continues to do its thing, even a week after it was announced and alerted to its existence and spread. But it seems that this ransomware has its days numbered. There are already free tools that help us to decrypt our hard drive without having to pay the 300 or 600 dollars that Wannacry asks for doing this.

These security tools are free and we only have to download them from their website, but unfortunately these solutions they are not valid for many users who have been affected but for those who have not yet been affected.

Wannakey and Wanakiwi are these two tools that we can use. Wanakiwi is based on Wannakey but it is not only a copy but an improvement. Thus, while Wannakey only works on computers with Windows XP, Wanakiwi works for all computers with versions prior to Windows 10. In both cases, the success of the tool only depends on not having turned off the computer, that is, it can only be applied once you have been infected by WannaCry.

For these tools to work, we must not have turned off the computer with WannaCry

These tools have been tested and validated by EuroPol, the international police of Europe, a quality seal that tells us that such a tool will solve the problem without having to pay money for our data. Interestingly these tools they work thanks to a vulnerability in Microsoft's encryption tool. WannaCry uses this encryption tool to take away our data but it can also be the opportunity we have to rescue it.

The Wannakey tool was born as a solution for computers with Windows XP, although currently, however statistically we have seen that Windows 7 users have been more infected than Windows XP users, so the wanakiwi tool was born. In any case, you can get Wanakiwi y wankey in both links.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.