PCDVD數位科技討論區
PCDVD數位科技討論區   註冊 常見問題 標記討論區為已讀

回到   PCDVD數位科技討論區 > 其他群組 > 七嘴八舌異言堂
帳戶
密碼
 

回應
 
主題工具
apink
*停權中*
 
apink的大頭照
 

加入日期: Oct 2016
文章: 63
[情報] Petya 勒索軟體作者釋出解密主金鑰

The author of the original Petya ransomware — a person/group going by the name of Janus Cybercrime Solutions — has released the master decryption key of all past Petya versions.

This key can decrypt all ransomware families part of the Petya family except NotPetya, which isn't the work of Janus. This list includes:

⩥ First Petya ransomware version (flashed white skull on red background during boot-up screens)
⩥ Second Petya version that also included Mischa ransomware (flashed green skull on black background during boot-up screens)
⩥ Third Petya version, also known as GoldenEye ransomware (flashed yellow skull on black background during boot-up screens)

載點

Malwarebytes security researcher Hasherezade cracked the file yesterday and shared its content:
引用:
Congratulations!
Here is our secp192k1 privkey:
38dd46801ce61883433048d6d8c6ab8be18654a2695b4723
We used ECIES (with AES-256-ECB) Scheme to encrypt the decryption password into the "Personal Code" which is BASE58 encoded.

Kaspersky Lab security researcher Anton Ivanov tested and confirmed the master key's validity.

This key is the private (server-side) key used during the encryption of past Petya versions. Decrypters can be built that incorporate this key. In the past, security researchers have cracked Petya encryption on at least two ocassions [1, 2], but with the private key in the open, decrypter will recover files much faster than the previously known methods.

Unfortunately, this decryption key won't be as useful as many people think.

Most (original) Petya campaigns happened in 2016, and very few campaigns have been active this year. Users that had their files locked have wiped drives or paid the ransom many months before. The key will only help those victims who cloned their drives and saved a copy of the encrypted data.

Decryption key is useless for NotPetya victims
This key won't help NotPetya victims because the NotPetya ransomware was created by "pirating" the original Petya ransomware and modifying its behavior by a process called patching. NotPetya used a different encryption routine and was proven to have no connection to the original Petya.

In 2016, Janus had been very active on Twitter while promoting a Ransomware-as-a-Service (RaaS) portal where other crooks could rent access to the Petya+Micha ransomware combo. Janus became active in 2017 after a long period of silence just to deny any involvement with the NotPetya outbreak.

Hashezerade believes that Janus released Petya's decryption key as a result of the recent NotPetya outbreak, and he might have decided to shut down his operation.

Janus is not the first ransomware author/group who released his master decryption key. The TeslaCrypt group did the same in the spring of 2016. Last year, Janus also hacked the servers of a rival ransomware author — Chimera ransomware — and dumped his decryption keys.

CR https://www.bleepingcomputer.com/ne...decryption-key/

Petya 勒索軟體背後的作者公開了解密主金鑰。
主金鑰可用於解密所有版本的 Petya 勒索軟體,但最近流行的 NotPetya 除外。NotPetya 偽裝成 Petya 勒索軟體,其目的被認為是為了破壞資料,本質上與 Petya 無關。

Petya 作者將主金鑰上傳到了檔案共享網站 Mega。安全研究人員已經證實了金鑰的真實性。專家相信 Petya 作者公開主金鑰的動機旨在與 NotPetya 攻擊切割,避免在 NotPetya 攻擊之後受到調查或被控發起了 NotPetya 攻擊。

CR AntiVirus
     
      
舊 2017-07-13, 06:52 AM #1
回應時引用此文章
apink離線中  
cys070
Elite Member
 
cys070的大頭照
 

加入日期: Aug 2003
文章: 10,523
說來好笑
這個怕被牽連查水表才放出來
還是個該死人x
 
舊 2017-07-13, 06:56 AM #2
回應時引用此文章
cys070離線中  
厝漢
Major Member
 
厝漢的大頭照
 

加入日期: Jun 2009
您的住址: 厝漢當然是龜在厝裡
文章: 223
不了解耶,都做了還被怕被抓嗎@@!? 而且 也沒聽說 哪個 勒索軟體 的團體被抓了
__________________
這是一個你努力,都不一定會成功的世界~~~~~~~~~
舊 2017-07-13, 08:19 AM #3
回應時引用此文章
厝漢離線中  
老柏(第四)
Senior Member
 
老柏(第四)的大頭照
 

加入日期: Mar 2012
您的住址: 地球
文章: 1,303
之前聽說過,做勒索軟體的賺夠了後就會把金鑰釋出不玩了,類似之前的自爆迴路
__________________
[/url]
老柏                 老柏(第二)

老柏(第三)              老柏(第四)
舊 2017-07-13, 08:58 AM #4
回應時引用此文章
老柏(第四)離線中  
DoeEyes
Basic Member
 

加入日期: Nov 2001
文章: 15
幹了一堆壞事,現在要脫身,洗白,這甚麼邏輯!!
舊 2017-07-13, 12:42 PM #5
回應時引用此文章
DoeEyes離線中  
marks
Elite Member
 

加入日期: Feb 2004
您的住址: 台北
文章: 4,272
引用:
作者老柏(第四)
之前聽說過,做勒索軟體的賺夠了後就會把金鑰釋出不玩了,類似之前的自爆迴路

難道之前的都沒賺夠嗎?
我還有一台中了cryptolocker的還沒解
不過忘記是不是變種的
舊 2017-07-13, 02:17 PM #6
回應時引用此文章
marks離線中  
iamyy2000
Elite Member
 
iamyy2000的大頭照
 

加入日期: Aug 2004
文章: 5,682
小小聲的請問一下,要怎麼把被加密的檔案利用此金鑰進行解密? 謝謝
__________________

行善之家、必有餘慶、積惡之家、必有餘殃。
天理昭彰、報應不爽、諸惡莫做、眾善奉行。

有因無緣、果報不現、因緣聚合、業報現前。
善有善報、惡有惡報、不是不報、時候未到。

定慧等持、精進修行、心存善念、行善布施。
諸天護衛、諸佛護祐、災劫消弭、逢凶化吉。

阿彌陀佛
舊 2017-07-13, 03:16 PM #7
回應時引用此文章
iamyy2000離線中  
misman+++
*停權中*
 

加入日期: Apr 2015
文章: 1,577
引用:
作者iamyy2000
小小聲的請問一下,要怎麼把被加密的檔案利用此金鑰進行解密? 謝謝


參考看看。
http://www.ithome.com.tw/news/105247


如果你是ESET的用戶,他們有出解密工具。
http://www.eset.tw/html/86/201606271/

舊 2017-07-13, 05:29 PM #8
回應時引用此文章
misman+++離線中  
cys070
Elite Member
 
cys070的大頭照
 

加入日期: Aug 2003
文章: 10,523
引用:
作者marks
難道之前的都沒賺夠嗎?
我還有一台中了cryptolocker的還沒解
不過忘記是不是變種的


不是每個都會想放出來

這個一看就是怕被另一個模仿他的給連累

趕快放出解密來切割
舊 2017-07-13, 05:30 PM #9
回應時引用此文章
cys070離線中  
cys070
Elite Member
 
cys070的大頭照
 

加入日期: Aug 2003
文章: 10,523
引用:
作者厝漢
不了解耶,都做了還被怕被抓嗎@@!? 而且 也沒聽說 哪個 勒索軟體 的團體被抓了

是不容易被抓,但有被抓到過
不然之前卡巴,趨勢這些資安公司也出不了解密工具(跟警方合作)

這隻勒索作者的大概沒想到有人會模仿他
怕自己夜路走多會出事xd

此文章於 2017-07-13 05:36 PM 被 cys070 編輯.
舊 2017-07-13, 05:34 PM #10
回應時引用此文章
cys070離線中  


回應


POPIN
主題工具

發表文章規則
不可以發起新主題
不可以回應主題
不可以上傳附加檔案
不可以編輯您的文章

vB 代碼打開
[IMG]代碼打開
HTML代碼關閉



所有的時間均為GMT +8。 現在的時間是07:42 PM.


vBulletin Version 3.0.1
powered_by_vbulletin 2025。