The Ragnarok ransomware team appears to have released a master key that can decrypt it archives locked by the malware.
The creator of the ransomware did not explain his move but uploaded a short instruction on how to decrypt the files on his website.
The site leakageof data has been removed and all that remains is the short text containing a file with the master key and the accompanying binaries for its use.
Looking at the page, it seems that the team was not planning to stop and just deleted everything and stopped its operation.
Earlier in the day, Ragnarok ransomware's leak site showed 12 victims, who were added between July 7 and August 16, according to the online threat website HackNotice.
By posting the victims on their website, the Ragnarok team tried to force them to pay a ransom, threatening to leak the unencrypted files that had been stolen during the intrusion.
The violated ones Companies they are from France, Estonia, Sri Lanka, Turkey, Thailand, USA, Malaysia, Hong Kong, Spain and Italy and are active in various sectors from construction to legal services.