A brute force campaign looking to set up a distributed denial of service (DDoS) botnet using a rare Linux rootkit malware has been launched, emanating from the servers of a Hong Kong-based company called Hee Thai Limited. The malware, known as XOR.DDoS, was first spotted in September by security.
Quite a guide information update in BleedingComputer worth checking out for recovery that may help but do verify that the file are indeed encrypted. Actually brute forcing the decryption key is not pragmatic as strong crypto key is already employed. Do assess if recovery is possible and not succumb to payment. But if data are indeed lost the only practical means to get back is the ransom which i do discourage as the attacker may play foul too.it is catch-22Just for info, in the case for Cryptolocker early genre, there is online service (e.g. ) though it is not warrant to decrypt all as they have only limited decryption key archived from their research.