Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Tool now Available for Decrypting Files Infected with Petya Ransomware

The community of cyber-security researchers recently blew against ransomware once more through the creation of one fresh tool that unlocks computer files of victims contaminated with the ransomware group of Petya strains. The tool for the moment is available for free till probably something else is decided.

Ransomware proliferating via phishing scams, dubious downloads and malevolent web-links is sadly occurring very frequently. The particular kind of malware proves highly destructive for victims since it stalls users' access to their computers, encrypts files and tries to extract money in exchange for supplying the so-called key to decrypt the files, even as it may or mayn't perform.

Presently, Petya asks for a 0.99 BTC (about USD 418) payment to release the decryption key to victims. Computer security specialist Lawrence Abrams from Bleeping Computer, of late, examined the tool to find that it used merely 7-secs time for producing the decryption key.

Within this pre-boot circumstance, the PC is normally stuck, while for regaining its locked files, end-users are demanded a ransom payment before feeding the password given to them in the pre-boot line of command. Softpedia.com posted this dated April 11, 2016.

Security investigators observed that Petya didn't interact with any command and control server whatsoever. This therefore suggested that perhaps encryption by the ransomware was entirely self-contained in the virus so the researchers proceeded towards examining the malware for discovering a solution to the encryption done.

The above information then requires getting changed to Base64 encryption followed with utilizing it on the tool creator's portal for production of the right key. Anybody not adept at doing this may utilize Peta Sector Extractor of Fabian Wosar for automatically capturing the said data. On completion of the process re-attachment of hard drive maybe done; its decryption and system reboot thereafter, to free the device of the Petya malware.

But suppose Petya operators continue to attack, it's probable that the above solution won't serve its purpose forever. For, there's always the cat-and-mouse game between security researchers and cyber-attackers. So any system impacted with Petya must be immediately tackled rather than wait to rescue it.

ยป SPAMfighter News - 4/20/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page