Ragnarok ransomware released decryption key

The Ragnarok ransomware team appears to have released a master key that can decrypt it locked away by evil .

The creator of the ransomware did not explain his move but uploaded a short instruction on how toof the files on his website.
decryption keys

The leak site has been removed and all that remains is the short text containing a file with the master key and the accompanying binaries for its use.

Looking at the page, it looks like the team didn't plan to stop and just deleted everything and stopped the her.

Earlier in the day, Ragnarok ransomware's leak site showed 12 victims, who were added between July 7 and August 16, according to the online threat website HackNotice.

By listing the victims on their website, the Ragnarok team tried to force them to pay a ransom, under the threat of leaking the unencrypted files stolen during of the invasion.

The compromised companies are from France, Estonia, Sri Lanka, Turkey, Thailand, the US, Malaysia, Hong Kong, Spain and Italy and operate in a variety of sectors, from construction to legal .

 

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.
ransomware, Ragnarok ransomware, iguru, iguru.gr

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).