Network security researcher claims to find a way to decode WannaCry
Adrien Guinet said he could decrypt (decrypt) the ransomware-infected computer running Windows XP in the lab by finding the sequence of numbers that makes up WannaCry's own password string. This series of numbers is what the ransomware victims of this extortion have to spend money to buy, thereby decrypting their files. Guinet said he could find it without paying a penny of Bitcoin .
Importantly, Guinet realized this technique was only effective on Windows XP . The reason is that this operating system is not affected by the ransomawre attack on May 12. However, WannaCry is now available on XP, but at least this technique can help victims.
Guinet wrote on Github: " To do this, your computer has never been rebooted after being infected. Remember also that you need some luck because in some cases it may not. effective ".
I have completed the decoding process but it can only restore files on the XP system
Why is that? Guinet explains that " when WannaCry invades a computer, it will generate a decrypted password string based on prime numbers. It is important that ransomware does not remove them from memory before releasing the associated memory ." " If you're lucky (the memory involved hasn't been deleted or redistributed), these good integers are still in there ."
If you can recover those numbers, you can decrypt the file, Guinet said. He released the software used to decrypt the infected WannaCry computer and called it Wannakey.
Wannakey has not been extensively tested, so it is still uncertain how effective it is. However, it also raised the hope that data encrypted by ransomware could be decrypted in the future. Anyway, that is good news.
You should read it
- All about WannaCry, Ransomware has been confusing for the past few days
- 2 effective and free ways to check WannaCry
- How to remove / fix ransomware WannaCry
- WannaCry remains one of the most dangerous global security threats
- Download the free WannaCry malware checker now
- How to identify WannaCry malicious code from Vietnam Computer Emergency Response Center (VNCERT)
- Warning with 4 dangerous variants of WannaCry malware
- WannaCry is not dead yet, it just attacked Honda and Australia's traffic camera system
- The more dangerous WannaCry version 2.0 has appeared
- Prevent WannaCry variants by turning off this Windows 10 installation
- List of file names, HASH SHA-256 codes containing WannaCry malware
- EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities
May be interested
How to identify WannaCry malicious code from Vietnam Computer Emergency Response Center (VNCERT)
Prevent WannaCry variants by turning off this Windows 10 installation
Malware Judy attacked more than 36.5 million Android phones
Malware invades through PowerPoint files without a macro
14-year-old Japanese boy was arrested for creating ransomware
Hackers start using SambaCry to attack Linux computers