Cryakl ransomware antidote released after servers seized

Haythem Elmir
0 1
Read Time1 Minute, 20 Second

Free decryption keys for the Cryakl ransomware were released last Friday – the fruit of an ongoing cybercrime investigation.

The keys were obtained during an ongoing investigation by the Belgian Federal Police and shared with the No More Ransom project, an industry-led effort to combat the growing scourge of file-encrypting malware.

The decryption utility was developed by security experts after the Belgian Federal Computer Crime unit located and seized a command-and-control server, allowing the recovery of decryption keys. Kaspersky Lab provided technical expertise to the Belgian authorities.

The decryption tool allows the file decryption of most – but not all – versions of Cryakl. “Version ‘CL 1.4.0.’ [is] not supported by the decrypter,” white hat group MalwareHunterTeam cautions.

Nonetheless, the release of tool will offer welcome relief to many of those organisations hit by Cryakl, which will now have the ability to recover encrypted files without paying crooks a ransom.

Since the launch of the NoMoreRansom scheme more than a year ago – in July 2016 – more than 35,000 people have managed to retrieve their files €10m, according to a statement by European policing agency Europol.

There are now 52 free decryption tools on www.nomoreransom.org, which can be used to decrypt 84 ransomware families. CryptXXX, CrySIS and Dharma are the most detected infections.

Ransomware has eclipsed most other cyber threats over recent years, with global campaigns now indiscriminately affecting organisations across multiple industries in both the public and private sectors, as well as consumers
To read the original aritcle:

 

http://www.theregister.co.uk/2018/02/12/cryakl_ransomware_antidote/

 

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Laisser un commentaire

Next Post

CSE CybSec ZLAB Malware Analysis Report: Dark Caracal and the Pallas malware family

Researchers from CSE ZLAB malware Analysis Laboratory analyzed a set of samples of the Pallas malware family used by the Dark Caracal APT in its hacking operations. The malware researchers from ZLab analyzed a collection of samples related to a new APT tracked as Dark Caracal, which was discovered by Electronic […]