Did Aurora Ransomware infect you? You can decrypt file for free

Haythem Elmir
0 1
Read Time1 Minute, 54 Second

Victims of the Aurora Ransomware could use a decryptor tool developed by the popular malware researcher Michael Gillespie to decrypt their data for free.

Good news for the victims of the Aurora Ransomware, there are many variants of this Windows malware but most of the victims have been infected by the version that appends the .Nano extension to the encrypted files.

Attackers infect systems through Remote Desktop Services accesses, once files are encrypted the ransomware will create on the Windows desktop and in various folders on the computer a ransom note.

Now the popular malware researcher Michael Gillespie has developed a decryptor that allows the victims to decrypt their files for free.

The decryptor supports the variants that append the following extensions to the encrypted files:

.Nano
.animus
.Aurora
.desu
.ONI
.aurora

To decrypt files encrypted by the Aurora ransomware, victims need to download and execute the Aurora Decryptor.

Aurora Ransomware

To start brute-force attack and retrieve the encryption key the victim have to provide two encrypted files of the following file types:

.png, .gif, .pdf, .docx, .xlsx, .pptx, .doc, .xls, .ppt, .vsd, .psd, .mp3, .wmv, .zip, .rar, .pst, .rtf, .mdb, .ico, .lnk, .fdb, .jar, and .idx

Once selected the two encrypted files the victims can start the Bruteforcer, the process could be time-consuming, but don’t worry.

The process will end with the discovery of the decryption key, closing the 
BruteForcer the key will be automatically loaded into the decryptor.

Now the users can choose to decrypt a directory by selecting it or to decrypt an entire drive by selecting the drive letter.

“When it has finished, the decryptor will display a summary of the amount of files that have been decrypted. If some of the files were skipped it may be due to permissions to the files.” reportedBleeping Computer that described the entire procedure step by step.

Note that the original encrypted files will remain on victim’s computer until he will confirm that they have been properly decrypted.

“you can use CryptoSearch to move all the encrypted files into one folder so you can delete or archive them.” suggests Lawrence Abrams.

Source:https://securityaffairs.co/wordpress/79525/malware/aurora-ransomware-decryptor.html

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Laisser un commentaire

Next Post

Flaw in Skype for Android exposes photos and contacts

A security expert found a flaw in Skype for Android that could be exploited by an unauthenticated attacker to view photos and contacts, and even open links in the browser. Security expert Florian Kunushevci (19) discovered a vulnerability that allows an unauthenticated local attacker to view photos and contacts, and […]