To help you determine the type of ransomware affecting your device, here are two sites that will to analyze your ransomware and will provide you with the link to download the decryption solution if available.
Assess Your Public Asset Risk Profile
A key capability of these tools is identifying exposed assets to enable owners and operators of Industrial Control Systems (ICS), IoT, and IIoT devices to reduce their attack surface by enumerating and detailing any number of Internet-connected targets. By pulling back banners of Internet-connected devices, end users can use any combination of search filters to narrow search results to specific queries for potentially vulnerable devices.
Shodan is a web-based search platform for internet-connected devices. A key capability of Shodan is its use as an attack surface reduction tool, with the ability to read any number of Internet-connected targets, including ICS and IIoT. By pulling back banners of Internet-connected devices, Shodan can find any combination of search filters to narrow search results to specifically target potentially vulnerable devices.
Censys is a web-based risk management tool that helps identify publicly accessible assets - even if they can't be scanned by a vulnerability management tool. A key capability of Censys.io is its use as an attack surface reduction tool, with the ability to recognize any number of Internet-connected targets, including ICS and IIoT. With the ability to assess and index IP addresses, parse TLS certificates, and track domains, Censys.io provides a 360-degree depiction of an organization's Internet attack surface. Censys.io has also been positioned as a platform capable of providing visibility into an organization's Internet remote workforce.
Thingful is a search engine for the Internet of Things (IoT). Thingful can also be used in the automatic discovery of IoT data pathways, and thereby support attack surface reduction activities; however, that capability is not its primary purpose. Thingful's main use cases are focused on the manipulation of IoT data in ways that unlock value and visibility within an identified dataset. Specifically, the ability to organize, access, respond and unlock IoT data streams into useful "data pipes" for consumption is key to Thingful's business model.