The Ragnarok ransomware group has been active since at least January 2020 and hit dozens of organizations worldwide.
The news was reported by Bleeping Computer that also noticed that ransomware operators have replaced all the victims on their leak site, leaving only the instruction on how to decrypt files along with a link to an archive containing the master key and the binaries for using it.
The Ragnarok gang is shutting down their operations and released the master key that can allow victims to decrypt their files for free.
Like other ransomware gangs, Ragnarok was implementing a double extortion model threatening to publish data stolen from the victims to force them into paying the ransom.
Experts from security firm Emsisoft confirmed that the decryptor released by the Ragnarok ransomware operators contains the master decryption key, they also announced that are working on decryptor that will be released very shortly.
Other ransomware gangs released the decryption key this year, some of them shut down operations other rebranded their operations. Below is the list of crews that released the decryption key:
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Ragnarok)
[adrotate banner=”5″]
[adrotate banner=”13″]
Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…
The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…
ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…
Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…
Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…
GreyNoise researchers warn of a new AyySSHush botnet compromised over 9,000 ASUS routers, adding a…
This website uses cookies.