Victims of PyLocky Ransomware can use a tool released by security researcher Mike Bautista at Cisco Talos group to decrypt their files for free. The bad news is that the recovery of the file is not simple because the decryption tool requires capturing the initial network traffic (PCAP file) between the ransomware and the C2 infrastructure. The ransomware was distributed via spam emails most of which targeted European countries, particularly France. At the end of the process, the ransomware drops a ransom note that could be in English, French, Korean, or Italian, which suggests possible targets of the operators behind the threat.”]
Source: https://securityaffairs.co/wordpress/79765/malware/pylocky-ransomware-decryptor.html