Free decryption keys for the Cryakl ransomware were released last Friday – the fruit of an ongoing cybercrime investigation.
The keys were obtained during an ongoing investigation by the Belgian Federal Police and shared with the No More Ransom project, an industry-led effort to combat the growing scourge of file-encrypting malware.
The decryption utility was developed by security experts after the Belgian Federal Computer Crime unit located and seized a command-and-control server, allowing the recovery of decryption keys. Kaspersky Lab provided technical expertise to the Belgian authorities.
The decryption tool allows the file decryption of most – but not all – versions of Cryakl. “Version ‘CL 1.4.0.’ [is] not supported by the decrypter,” white hat group MalwareHunterTeam cautions.
Nonetheless, the release of tool will offer welcome relief to many of those organisations hit by Cryakl, which will now have the ability to recover encrypted files without paying crooks a ransom.
Since the launch of the NoMoreRansom scheme more than a year ago – in July 2016 – more than 35,000 people have managed to retrieve their files €10m, according to a statement by European policing agency Europol.
There are now 52 free decryption tools on www.nomoreransom.org, which can be used to decrypt 84 ransomware families. CryptXXX, CrySIS and Dharma are the most detected infections.
Ransomware has eclipsed most other cyber threats over recent years, with global campaigns now indiscriminately affecting organisations across multiple industries in both the public and private sectors, as well as consumers
To read the original aritcle:
http://www.theregister.co.uk/2018/02/12/cryakl_ransomware_antidote/