Security experts at Emsisoft released a new decrypted in a few days, it could be used for free by victims of the GetCrypt ransomware to decrypt their files encrypted by the malware.
The GetCrypt ransomware is served through the RIG exploit kit, it leveragesSalsa20 and RSA-4096 to encrypt the victims’ files.
“GetCrypt is a ransomware spread by the RIG exploit kit, and encrypts victim’s files using Salsa20 and RSA-4096. It appends a random 4-character extension to files that is unique to the victim.” reads the post published by Emsisoft.
The ransomware drops on the infected systems the file “# DECRYPT MY FILES #.txt” containing the follwing ransom note:
“Attention! Your computer has been attacked by virus-encoder! All your files are now encrypted using cryptographycalli strong aslgorithm. Without the original key recovery is impossible.
TO GET YOUR DECODER AND THE ORIGINAL KEY TO DECRYPT YOUR FILES YOU NEED TO EMAIL US AT: GETCRYPT@COCK.LI It is in your interest to respond as soon as possible to ensure the restoration of your files. P.S only in case you do not recive a response from the first email address within 48 hours, [redacted]. It is in your interest to respond as soon as possible to ensure the restoration of your files.
P.S only in case you do not recive a response from the first email address within 48 hours,
[redacted]“
Victims can download the decrypter for free at the following URL:
https://www.emsisoft.com/decrypter/download/getcrypt
In order to decrypt the files, victims have to provide an encrypted version of a file and the original of the same file.
A few days ago, Emsinsoft released a free Decrypter for JSWorm 2.0
Thank you
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – GetCrypt ransomware, cybercrime)
[adrotate banner=”5″]
[adrotate banner=”13″]
Cisco addressed multiple vulnerabilities in IOS and IOS XE software that can be exploited to…
Google's Threat Analysis Group (TAG) and Mandiant reported a surge in the number of actively…
Google addressed two zero-day vulnerabilities in the Chrome web browser that have been demonstrated during…
The INC Ransom extortion group hacked the National Health Service (NHS) of Scotland and is threatening…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft SharePoint vulnerability disclosed at the…
This is the advantage of Data Detection and Response (DDR) for organizations aiming to build…
This website uses cookies.