spot_img

Decryption Keys For Maze, Egregor, Sekhmet Ransomware Released

Share post:

A user named “Topleak” has leaked the master decryption for three major ransomware operations (Maze, Egregor, and Sekhmet) on BleepingComputer forums.

The post includes a download link for a 7zip file with four archives containing the Maze, Egregor and Sekhmet decryption keys. It also contains the source code for an ‘M0yv’ malware used by the gang.

Each of the four archives contains both the public master encryption key and the private master decryption key. This is associated with a specific “advert” or affiliate of the gang.

In total, the archives have 9 Maze master decryption keys for the original malware, which is aimed at non-corporate users, 30 Maze master decryption keys, 19 Egregor master decryption keys and 1 Sekhmet master decryption key.

While claiming to be the developer for the three operations, the user behind the leak stated that the action was intentional, and further stated that it had nothing to do with law enforcement against the arrest of attackers.

For more information, read the original story in BleepingComputer.

spot_img

SUBSCRIBE NOW

Related articles

Cyber Security Today, March 22, 2023 – ChatGPT4 is out, poorly-protected Linux servers are exploited, and more

ChatGPT4 is out, poorly-protected Linux servers are exploited, and more. Welcome to Cyber Security Today. It’s Wednesday, March 22nd, 2023. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S. The new version of ChatGPT has been released. But if you were hoping that version 4 has made this tool safer

Only 9 per cent of Canadian firms are cyber mature: Cisco report

Only 15 per cent of companies around the world would have a mature cyber readiness, according to survey

Ferrari notifies customers of ransom demand

Exclusive car maker says some client contact information exposed in cy

Government backs down on document demand from Google, Facebook

Change meets criticism that demand for external communications is an invasion

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways