Oops! Black Basta ransomware flubs encryption
Researchers have found a flaw in the Black Basta ransomware encryption algorithm, allowing decryption of some files.
Read moreResearchers have found a flaw in the Black Basta ransomware encryption algorithm, allowing decryption of some files.
Read moreCredit to Author: Hugh Aver| Date: Mon, 18 Apr 2022 21:53:16 +0000
Kaspersky experts have found a way to decrypt files encrypted by Yanluowang ransomware.
Read moreCredit to Author: Pieter Arntz| Date: Wed, 23 Feb 2022 13:58:00 +0000
Researchers have found a flaw in the Hive ransomware encryption method that allows them to recover a high percentage of the encrypted files.
The post Hive ransomware: Researchers figure out a method to decrypt files appeared first on Malwarebytes Labs.
Read moreCredit to Author: Pieter Arntz| Date: Wed, 06 Mar 2019 16:00:00 +0000
Troldesh is ransomware that relies heavily on user interaction. Nevertheless, a recent spike in detections shows it’s been successful against businesses in the first few months of 2019. Categories: Tags: decryptordecryptorsransom.troldeshransomwareransomware remediationshadethreat spotlightTroldesh |
The post Spotlight on Troldesh ransomware, aka ‘Shade’ appeared first on Malwarebytes Labs.
Read moreCredit to Author: Vasilios Hioureas| Date: Tue, 27 Mar 2018 15:00:00 +0000
In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live example of a ransomware in detail, and talked about encryption weaknesses. In this part of the encryption 101 series, we will begin wrapping it up by going into detail on a ransomware with weak… Categories: Tags: break encryptiondecryptorencrpytion functionalityencryptionPrincessLockerransomware |
The post Encryption 101: Decryptor’s thought process appeared first on Malwarebytes Labs.
Read moreCredit to Author: Malwarebytes Labs| Date: Mon, 24 Jul 2017 17:17:38 +0000
This post shows you how to use the special decryptor for the petya family: Petya, Msicha, and Goldeneye. Not suitable for copycats of these. Categories: Tags: decryptorgoldeneyemftMischapetyatoos |
The post Bye, bye Petya! Decryptor for old versions released. appeared first on Malwarebytes Labs.
Read moreCredit to Author: Malwarebytes Labs| Date: Mon, 29 May 2017 14:21:41 +0000
Pirated versions of DMA-locker are doing the rounds, but there is some good news. All the encrypted data can be decrypted with the same key and we can give it to you. Categories: Tags: decryptorDMA Lockerfakexptlock |
The post A stolen version of DMA Locker is making the rounds appeared first on Malwarebytes Labs.
Read moreCredit to Author: Malwarebytes Labs| Date: Mon, 29 May 2017 14:21:41 +0000
Pirated versions of DMA-locker are doing the rounds, but there is some good news. All the encrypted data can be decrypted with the same key and we can give it to you. Categories: Tags: decryptorDMA Lockerfakexptlock |
The post A stolen version of DMA-locker is making the rounds appeared first on Malwarebytes Labs.
Read more