The Ragnarok ransomware team appears to have released a master key that can decrypt files locked by malware.
The ransomware developer did not explain the move but posted a brief guide on how to decrypt files on his site.
The leak site data has been removed and all that remains is the short text containing a file with the master key and the accompanying binaries for its use.
Looking at the page, it looks like the team didn't plan to stop and just deleted everything and stopped the mode her.
Earlier in the day, Ragnarok ransomware's leak site showed 12 victims, who were added between July 7 and August 16, according to the online threat website HackNotice.
By listing the victims on their website, the Ragnarok team tried to force them to pay a ransom, under the threat of leaking the unencrypted files stolen during duration of the invasion.
The hacked companies are from France, Estonia, Sri Lanka, the Turkey, Thailand, USA, Malaysia, Hong Kong, Spain and Italy and are active in various sectors from construction to legal services.