FonixCrypt ransomware releases the decryption key

The FonixCrypter ransomware development team announced today on Twitter that they have deleted the ransomware source code and intend to shut it down.

As a goodwill gesture to previous victims, the FonixCrypter gang released one which contains a decryption tool, instructions and the ransomware master decryption key.

These files can be used by infected users to decrypt and recover their files for free, without having to pay a ransom.

Allan Liska, a researcher tested the decryptor and confirmed that the FonixCrypter app, instructions and master key work as the criminals say.

“The decryption key provided by the behind Fonix ransomware seems to be legitimate, I believe it requires from every to be decrypted separately ", said Liska on ZDNet.

"The important thing is that they released the master key, which enables someone to create a much better decryption tool," he added.

A better cryptographer is currently in Emsisoft projects and is expected to be released next week, said Michael Gillespie, an Emsisoft security researcher.

Users are advised to wait for the Emsisoft decoder instead of using the FonixCrypter developer decryptor. No one can be sure if it contains backdoors.

The FonixCrypter ransomware gang has been active since at least June 2020, according to Andrew Ivanov, a Russian security researcher who tracks ransomware on his personal blog for the past four years.

Ivanov's blog post about FonixCrypter presents a history of constant updates to FonixCrypt code, with at least seven different FonixCrypt variants released last year.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).