BlackByte Ransomware Decryptor Released To Recover Files

Share post:

A decryptor for the BlackByte Ransomware was released, which allows the victims of the past to restore their files for free.

As stated by a Trustwave report, researchers said BlackByte downloaded a file called ‘forest.png’ from a remote site under their control, and although the file is supposed to appear as an image file, it contains the AES encryption key used to encrypt a device.

Since BlackByte uses symmetrical AES encryption, the same key can be used to encrypt and decrypt files.

In the Trustwave discovery, BlackByte not only encrypts the AES encryption key in question downloaded and adds it to the ransom note, but the gang also used the same forest.png file for multiple victims and since the same ‘raw’ encryption key was reused, Trustwave could, in turn, use the key to build a decryption key that restores a victim’s files for free.

BlackByte victims interested in using the Trustwave decryptor are advised to download the source code from Github and compile it themselves, as Trustwave already included a default ‘forest.png’ file from which the decryption key is extracted.

It is also recommended to back up files before attempting to decrypt them, as it is possible that BlackByte rotates the encryption keys downloaded in that file.

For more information, read the original story in BleepingComputer.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways