Locky infection? Unlock your files

A few days ago, the Electronic Crime Prosecution with a press release he warned the Greek online community for the appearance of Locky ransomware. But because the is running and they probably didn't catch the good news, we will announce it to you. crypto Locky

The software developer s used by the Locky ransomware released the decryption keys for the malware's victims.

User files infected by ransomware are locked with AES encryption. All malware-affected files have the .locked extension, which will not leave if the infected users do not pay for the ransom demanded by the scammers. (0,5 BTC is about 210 dollars).

The unknown developer of Locky uses the EDA2 software to encrypt.

Big mistake.

Project developer EDA2 deliberately left a backdoor in his code to make sure he could control possible software abuses.

So Utku Sen, the man behind the project, in this particular case had a path to get the decryption keys, which he immediately afterwards made freely available for download. (The link is at the end of the post).

1

Here, let's mention that malware developers will not be left with their hands crossed, and we think Lócky will be back with a new version.

However, those who are infected can unlock their files without paying a ransom. Decrypt your files with the keys below, and next time pay more attention to the files you download on your computer. The intentions of all are not the same.

Update: After dealing with the issue, as long as we did not have a computer infected with Locky, we found that these keys do not concern files that are encrypted and have .locky intent. Therefore, they concern different malware.

Download the decryption keys

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).