Security experts at Emsisoft released a new decrypted in a few days, it could be used for free by victims of the GetCrypt ransomware to decrypt their files encrypted by the malware.
The GetCrypt ransomware is served through the RIG exploit kit, it leveragesSalsa20 and RSA-4096 to encrypt the victims’ files.
“GetCrypt is a ransomware spread by the RIG exploit kit, and encrypts victim’s files using Salsa20 and RSA-4096. It appends a random 4-character extension to files that is unique to the victim.” reads the post published by Emsisoft.
The ransomware drops on the infected systems the file “# DECRYPT MY FILES #.txt” containing the follwing ransom note:
“Attention! Your computer has been attacked by virus-encoder! All your files are now encrypted using cryptographycalli strong aslgorithm. Without the original key recovery is impossible.
TO GET YOUR DECODER AND THE ORIGINAL KEY TO DECRYPT YOUR FILES YOU NEED TO EMAIL US AT: GETCRYPT@COCK.LI It is in your interest to respond as soon as possible to ensure the restoration of your files. P.S only in case you do not recive a response from the first email address within 48 hours, [redacted]. It is in your interest to respond as soon as possible to ensure the restoration of your files.
P.S only in case you do not recive a response from the first email address within 48 hours,
[redacted]“
Victims can download the decrypter for free at the following URL:
https://www.emsisoft.com/decrypter/download/getcrypt
In order to decrypt the files, victims have to provide an encrypted version of a file and the original of the same file.
A few days ago, Emsinsoft released a free Decrypter for JSWorm 2.0
Thank you
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – GetCrypt ransomware, cybercrime)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.