No More Ransom is celebrating its 5th anniversary and the project says it has helped more than 6 million ransomware victims recover their files and prevented cybercriminals from earning roughly $1 billion.
No More Ransom is a joint effort of law enforcement and cybersecurity companies whose goal is to help victims of ransomware attacks recover their files without having to pay the ransom demanded by criminals.
Launched in July 2016, the project currently has 170 partners and it provides more than 120 free tools from Emsisoft, Kaspersky, Trend Micro, Bitdefender, Avast, and several other cybersecurity firms, as well as a few government agencies. These tools cover 151 ransomware families.
According to Europol, the free recovery tools offered by No More Ransom have been downloaded more than 6 million times, and the project estimates that it has prevented cybercriminals from making approximately $1 billion.
The No More Ransom website is available in 37 languages and most of the users who visited the website came from South Korea, the United States, India, China and Indonesia.
In addition to decryption tools, the website, which was re-designed for its 5th anniversary, hosts prevention advice and a ransomware Q&A.
Users can quickly learn if any of the tools provided by No More Ransom are useful to them through the site’s Crypto Sheriff feature, which determines the type of ransomware based on encrypted files, the ransom note, email addresses, URLs or cryptocurrency wallet addresses.
Related: Kaseya Obtains Universal Decryptor for Ransomware Attack Victims
Related: New GandCrab Ransomware Decryptor Released
Related: Decryptor Released for Ransomware That Allegedly Helped Cybercriminals Make Millions
Related: French Authorities Release Free Decryptor for PyLocky Ransomware

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Many VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
Latest News
- Many VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- Fraudulent “CryptoRom” Apps Slip Through Apple and Google App Store Review Process
- US Downs Chinese Balloon Off Carolina Coast
- Microsoft: Iran Unit Behind Charlie Hebdo Hack-and-Leak Op
- Feds Say Cyberattack Caused Suicide Helpline’s Outage
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
