Jump to content

Recommended Posts

Posted

3b01fd4380aea95c5a8c44355ef3de1f.png f845b18fc89428ee85c9afed91b842a1.jpg

 

Fabian Wosar, Emsisoft security researcher at day and ransomware killer at night, has made two new victims after releasing a new decrypter for the HydraCrypt and UmbreCrypt ransomware families.

 

Both ransomware families are new and were first detected this year, first HydraCrypt, and then UmbreCrypt.

At their core, both stem from the CrypBoss ransomware variant that somebody leaked last year, putting its source code on PasteBin.

 

With its source code out in the open, security researchers quickly cracked its encryption algorithm and provided decrypters for the original variant and all of the subsequent mutations that evolved from the PasteBin leak.

 

Despite encryption error, both ransomware families can be cracked

 

As more data gathered on these two new families, Mr. Wosar was eventually able to adjust his previous CrypBoss decrypter to target these two new threats.

 

"Unfortunately the changes made by the HydraCrypt and UmbreCrypt authors cause up to 15 bytes at the end of the file to be damaged irrecoverably," the researcher explained.

 

The good news is that most of the times these bytes are useless, usually added as buffer data, and don't always affect the decryption process.

Additionally, the people behind these two new ransomware variants made very few modifications to the original CrypBoss source, so their ransomware's encryption algorithm is still vulnerable.

 

Mr. Wosar's decrypter, which is available for download via Emsisoft's site, will be able to tackle both HydraCrypt and UmbreCrypt at the same time.

 

How to crack the encryption key and how to decrypt files

 

To decrypt their files, users should first extract the decryption key.

They can do this by taking an encrypted file along with its original version (if available from a backup location like Google Drive, Dropbox, email, portable hard drive).

The user should select both files, and drag-and-drop them over the decrypter's executable. See animated GIF below.

 

If they can't find a file in both encrypted-original format, users can also get a random encrypted file and a random PNG image off the Internet, and also drag-and-drop it over the decrypter's executable.

 

This gesture will start the encryption key cracking process, which may sometimes take a day or longer. Once the decryption key is obtained, users should write it down on paper just to be safe, and then copy-paste it inside a text file for later use.

 

Once you have the decryption key in hand, you can double-click the decrypter to start it outright, select the folders you want to decrypt files from, enter the decryption key, and sit back for the next day or so until all files are cracked.

 

Mr. Wosar suggests testing the decryption key first on one single file to be sure it works correctly.

Additionally, the decrypter also does not delete the encrypted files, so make sure you have enough space on your hard drive to store all the decrypted files.

 

cdecbdf9eb5fc1ee58fb94414be213af.gif

How to start the encryption key cracking process

 

 

Source:

http://news.softpedia.com/news/hydracrypt-and-umbrecrypt-ransomware-cracked-decrypter-available-for-download-500345.shtml

76c90dd0e79a714317a8daeecc1584d2.png

  • FPCH Staff
Posted
Thanks for that post. That's great news. Unfortunately, most users won't have a backed up file to compare to the encrypted file. Keep telling users to backup. Ideally, backup to more than one device, keep the backup off-line. Keep a backup off-site.
  • FPCH Admin
Posted

Hardly anyone ever listens to me either about making backups.

(Until or unless something bad happens.)

~I know that you believe you understand what you think I said, but I'm not sure you realize that what you heard is not what I meant.~

~~Robert McCloskey~~

  • FPCH Staff
Posted
Same here. I had a guy here today with a laptop that I worked on last year. The laptop was here for a display replacement. This was mentioned in another thread. Anyway, I noted when I last worked on the laptop, a few months ago, it ran chkdsk when booted. I made mention of this in the invoice back then. He's done nothing to backup his files and the machine ran chkdsk again today when I booted after replacing the display. He's going to lost his hard drive. I told him. I even told him that if he purchases a flash drive, I would backup his files for him. No charge. I don't expect to see him until his machine won't start.
Posted

All very true.

If everyone had proper backups the ransomware guys would be out of work in no time.

It's not as if backing up is rocket science....... it's so easy nowadays.

76c90dd0e79a714317a8daeecc1584d2.png

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...