Locky infection? Unlock your files

A few days ago, the Electronic Crime Prosecution with a press release he warned the Greek online community for the appearance of Locky ransomware. But because technology is running and probably did not get the good news, we will let you know. crypto Locky

The developer of the encryption software used by the Locky ransomware released the decryption for malware victims.

Files of users affected by the ransomware are locked with AES encryption. All files affected by the malware have the .locked extension, which will not go away unless the affected users pay the that scammers ask for. (0,5 BTC is about $210).

The unknown developer of Locky uses the EDA2 software to encrypt.

Big mistake.

Project developer EDA2 deliberately left a backdoor in his code to make sure he could control possible software abuses.

So Utku Sen, the man behind the project, in this particular case had a gateway to receive the decryption keys, which he then freely made available to . (Το link is at the end of the post).

1

Here, let's mention that malware developers will not be left with their hands crossed, and we think Lócky will be back with a new version.

However, those affected can unlock their files without paying a ransom. Decrypt your files with the keys below, and next time be more careful about the files you download to your. Not everyone's intentions are the same.

Update: After dealing with the issue, as long as we did not have a computer infected with Locky, we found that these keys do not concern files that are encrypted and have .locky intent. Therefore, they concern different malware.

Download the decryption keys

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).