starbuck Posted February 12, 2016 Posted February 12, 2016 Fabian Wosar, Emsisoft security researcher at day and ransomware killer at night, has made two new victims after releasing a new decrypter for the HydraCrypt and UmbreCrypt ransomware families. Both ransomware families are new and were first detected this year, first HydraCrypt, and then UmbreCrypt. At their core, both stem from the CrypBoss ransomware variant that somebody leaked last year, putting its source code on PasteBin. With its source code out in the open, security researchers quickly cracked its encryption algorithm and provided decrypters for the original variant and all of the subsequent mutations that evolved from the PasteBin leak. Despite encryption error, both ransomware families can be cracked As more data gathered on these two new families, Mr. Wosar was eventually able to adjust his previous CrypBoss decrypter to target these two new threats. "Unfortunately the changes made by the HydraCrypt and UmbreCrypt authors cause up to 15 bytes at the end of the file to be damaged irrecoverably," the researcher explained. The good news is that most of the times these bytes are useless, usually added as buffer data, and don't always affect the decryption process. Additionally, the people behind these two new ransomware variants made very few modifications to the original CrypBoss source, so their ransomware's encryption algorithm is still vulnerable. Mr. Wosar's decrypter, which is available for download via Emsisoft's site, will be able to tackle both HydraCrypt and UmbreCrypt at the same time. How to crack the encryption key and how to decrypt files To decrypt their files, users should first extract the decryption key. They can do this by taking an encrypted file along with its original version (if available from a backup location like Google Drive, Dropbox, email, portable hard drive). The user should select both files, and drag-and-drop them over the decrypter's executable. See animated GIF below. If they can't find a file in both encrypted-original format, users can also get a random encrypted file and a random PNG image off the Internet, and also drag-and-drop it over the decrypter's executable. This gesture will start the encryption key cracking process, which may sometimes take a day or longer. Once the decryption key is obtained, users should write it down on paper just to be safe, and then copy-paste it inside a text file for later use. Once you have the decryption key in hand, you can double-click the decrypter to start it outright, select the folders you want to decrypt files from, enter the decryption key, and sit back for the next day or so until all files are cracked. Mr. Wosar suggests testing the decryption key first on one single file to be sure it works correctly. Additionally, the decrypter also does not delete the encrypted files, so make sure you have enough space on your hard drive to store all the decrypted files. How to start the encryption key cracking process Source: http://news.softpedia.com/news/hydracrypt-and-umbrecrypt-ransomware-cracked-decrypter-available-for-download-500345.shtml Quote
FPCH Staff Tony D Posted February 13, 2016 FPCH Staff Posted February 13, 2016 Thanks for that post. That's great news. Unfortunately, most users won't have a backed up file to compare to the encrypted file. Keep telling users to backup. Ideally, backup to more than one device, keep the backup off-line. Keep a backup off-site. Quote
FPCH Admin allheart55 Cindy E Posted February 13, 2016 FPCH Admin Posted February 13, 2016 Hardly anyone ever listens to me either about making backups. (Until or unless something bad happens.) Quote ~I know that you believe you understand what you think I said, but I'm not sure you realize that what you heard is not what I meant.~ ~~Robert McCloskey~~
FPCH Staff Tony D Posted February 13, 2016 FPCH Staff Posted February 13, 2016 Same here. I had a guy here today with a laptop that I worked on last year. The laptop was here for a display replacement. This was mentioned in another thread. Anyway, I noted when I last worked on the laptop, a few months ago, it ran chkdsk when booted. I made mention of this in the invoice back then. He's done nothing to backup his files and the machine ran chkdsk again today when I booted after replacing the display. He's going to lost his hard drive. I told him. I even told him that if he purchases a flash drive, I would backup his files for him. No charge. I don't expect to see him until his machine won't start. Quote
DSTM Posted February 13, 2016 Posted February 13, 2016 I have no sympathy when they come crying they have lost photos that can't be replaced. There are plenty of warnings to backup on the Net. Quote Roses are red, violets are blue, I'm Schizophrenic, and so am I Free Photo Restoration and Repair for all Forum members - CLICK HERE Please pop back and let us know if your Computer problem has been solved.
starbuck Posted February 13, 2016 Author Posted February 13, 2016 All very true. If everyone had proper backups the ransomware guys would be out of work in no time. It's not as if backing up is rocket science....... it's so easy nowadays. Quote
Recommended Posts