Master Decryption Key Of Original Petya Ransomware Released
The original Petya ransomware generated in 2016, can now easily be broken open using its master decryption key, its author Johns Cyber crime Solution has released the key as an encrypted file, which was torn by Malwarebytes. Please note that this chat does not work on recent Petya/Notpetya wiper malware in which the affected computers do not have the ability to decrypt.
You know that recently the Petya / Petya is a malware attack, which is a disguised wiper in the form of a ransomware, before the 2016 Petya ransomware originally. Recently, the creator of the original Petya, Janus Cyber Crime Solutions (one person or one group) came out of the shadow and declared that he is not the mastermind behind the new Petya malware attack.
Now, Janus has gone ahead and has released the master decryption key for all the ransomware of the late Petya family - including GoldenEye, which was the last Petya version released by Janus. Please note that this key does not work on recent NotPetya malware, which does not have the ability to decrypt the affected system.
Janus has shared the master key on Twitter to let the affected people decrypt their files for free.
"They're right in front of you and can open very large doors" https://t.co/kuCUMZ5ZWP @hasherezade @MalwareTechBlog ;)— JANUS (@JanusSecretary) July 5, 2017
However, the linked file was encrypted and the password was preserved. However, a security researcher at Malwarebytes estimated the password and decrypted the package with openssl. Therefore, here is the content of the file, that is, the original Petya ransomware master key in plain text:
Congratulations!
Here is our secp192k1 privkey:
38dd46801ce61883433048d6d8c6ab8be18654a2695b4723
We used ECIES (with AES-256-ECB) Scheme to encrypt the decryption password into the “Personal Code” which is BASE58 encoded.
Congratulations!
Here is our secp192k1 privkey:
38dd46801ce61883433048d6d8c6ab8be18654a2695b4723
We used ECIES (with AES-256-ECB) Scheme to encrypt the decryption password into the “Personal Code” which is BASE58 encoded.
While some previous versions of the patio were broken, but this key can help affected people who have preserved the encrypted disk in the hope of getting their files back.
Only if you are thinking that why Janus is trying to shine, then this may be due to all the publicity surrounding this new patio / notepeta wiper. It may be possible that Jansus does not want to be associated with the new version and is trying to improve by releasing the key for the older versions.
Is this article useful? Do not forget to share your experiences.
Only if you are thinking that why Janus is trying to shine, then this may be due to all the publicity surrounding this new patio / notepeta wiper. It may be possible that Jansus does not want to be associated with the new version and is trying to improve by releasing the key for the older versions.
Is this article useful? Do not forget to share your experiences.
Can you hack someone else's phone? There are many software offered by different hackers, all with price tags ranging from $300 to about $5000. Some of the apps offer text messages and call monitoring, photo/video interception, geo-location tracing and even control software to remotely shut phones down or read texts.
ReplyDeleteHacking has been going on for a very long time, and no matter how big technology gets, the hacking continues to happen. It's not just a side effect of living in a technological world - it can also be useful for manipulating data and security systems. With this new hacking software recently discovered from professional hackers, more people can experience the thrill of tampering with someone else's phone from the comfort of their own home.
Hacking any mobile phone or other device through hacking softwares or accessing lot of information about your personal details is either long term commitment or it entirely depend on the hacker. Hacking mobile phone allow you to spy, send SMS to random contacts without permission, take away social media account and much more.
Hackers who work with law enforcement can sell you hacking software. Alternatively, other hackers advertise their services online. All of this differentiates between computer theft and hacking. The latter involves having consent to access the data for a specific purpose.
If you want to hack a phone and you don't know how, you need to get the right software for this. The best way is to get it from someone who knows hacking.HACKINGGLOBAL@PROTONMAIL.COM