There is a tool to decrypt the ransomware that specializes in attacking businesses
Kaspersky recently revealed that they found a flaw in the encryption algorithm of the Yanluowang ransomware. Thanks to that, researchers have found a way to restore files encrypted by this ransomware.
Russian cybersecurity firm has added support for decrypting files encrypted by Yanluowang to its RannohDecryptor utility.
"Kaspersky experts analyzed the ransomware and found a vulnerability that allows decryption of affected users' files through a know-plaintext attack," Kaspersky shared.
This ransomware family encrypts files larger than 3GB and files smaller than 3GB using different methods. Large files are partially encrypted in 5MB strips every 200MB while small files are encrypted end-to-end.
Therefore, if the original file is larger than 3GB, it can decrypt all encrypted files on the system, including large files and small files. But if the original file is smaller than 3GB, it can only decrypt small files.
To decrypt your file, you need at least one original file:
- To decrypt small files (less than or equal to 3GB), you need a pair of files that are 1024 bytes or larger. This will decrypt all other small files.
- To decrypt large files (over 3GB), you need a pair of files (encrypted and original) each no less than 3GB in size. This is enough to decrypt both large and small files.
To decrypt files encrypted by the Rannoh ransomware, you need to use the Rannoh decryption tool provided for free by Kaspersky:
King Yama specializes in attacking large businesses.
According to statistics from cybersecurity experts, the King of Hell specializes in attacking large businesses around the world, especially financial institutions. You can learn more about the King of Hell ransomware in the article below:
Recently, Broadcom's Symantec Threat Hunter Team discovered a new ransomware called Yanluowang (Yanluowang, one of the 10 Kings of Hell). Currently, this new ransomware is still in the development stage and its target is to attack businesses.
The Yama Ransomware was discovered when experts were investigating an incident involving a reputable organization. The investigation was launched after they detected suspicious activity involving the command-line Active Directory query tool AdFind.
AdFind is often used by the actors behind ransomware for reconnaissance tasks including accessing information necessary for movement through the victim's network.
Once deployed on the victim's machine, the Yanluowang ransomware encrypts all files and appends the .yanluowang extension. They also leave behind a README.txt file demanding ransom and warning victims not to contact law enforcement or ransomware companies.
If the victim refuses to pay or contacts other parties, the people behind the King of Hell are ready to carry out DDoS attacks, delete data, repeat the attack.
Although still in development, Yama is still considered a dangerous malware. Targeting large companies and businesses, this ransomware can cause unpredictable damage.
Countries around the world are currently very active in cooperating and working together to eradicate ransomware distribution gangs.
You should read it
- Ransomware can encrypt cloud data
- General guidelines for decoding ransomware
- What is Ransomware Task Force (RTF)?
- [Infographic] 7 effective ways to protect businesses from Ransomware
- How to decode ransomware InsaneCrypt (Everbe 1.0)
- Why is Ransomware the perfect hack?
- Learn about Ransomware: 6 ransomware on computers
- Detecting two unusual versions of ransomware, shows that the world of ransomware has become diversified
May be interested
- What is Ransomware Ryuk? How to prevent it?cybercriminals are using a new form of ransomware to target large businesses and take money from it. since august, the ryuk team has made $ 4 million by installing malicious encryption software on high-value targets.
- How to decrypt encrypted files, recover data encrypted by Ransomwareno more ransome called for cooperation to fight ransomware, helping victims recover their data without paying ransom for hackers. the project website not only provides computer users with a way to protect themselves from ransomware, but also provides a set of free decoding tools.
- Warning: Babuk Locker Ransomware is Active Again, Attacking the Worldafter a 3-month hiatus under the name babuk locker, it has returned to creating custom ransomware executables that now target victims around the world.
- Detecting a new ransomware strain that specializes in stealing login information from the Chrome browsera ransomware strain called qilin was recently discovered using a relatively sophisticated tactic, with high customization capabilities, to steal account login information stored in the google chrome browser. .
- How to decrypt files and folders on Windows 10in today's world of rampant hacking and data theft, keeping files encrypted is one of the few viable ways to protect them from abuse.
- Kaseya suffered a ransomware attack, affecting a series of other technology companiesa ransomware attack against the international information technology company kaseya appears to have infected hundreds of small businesses involved.
- Free Lorenz ransomware decryption tool helps victims recover stolen datadutch cybersecurity company tesorion has released a free decryptor for the lorenz ransomware, which helps victims recover some stolen data without paying a ransom.
- Windows SMB users should close some ports to prevent WannaCrywill ransomware wannacry come back to attack us? try closing some of the ports below to prevent ransomware from attacking!
- Network security researcher claims to find a way to decode WannaCryransomware wannacry has infected hundreds of thousands of computers around the world. recently, a cyber security researcher said he had found a way to defeat it.
- List of the 3 most dangerous and scary Ransomware viruseswhile security solutions to protect us from threats, hackers are increasingly improving, while malicious programs (malware) are also becoming more and more 'cunning'. and one of the recent threats is how to extort money through ransomware.