The Ragnarok ransomware team appears to have released a master key that can decrypt it archives locked away by evil software.
The creator of the ransomware did not explain his move but uploaded a short instruction on how toencryptionof the files on his website.
The leak site has been removed and all that remains is the short text containing a file with the master key and the accompanying binaries for its use.
Looking at the page, it looks like the team didn't plan to stop and just deleted everything and stopped the mode her.
Earlier in the day, Ragnarok ransomware's leak site showed 12 victims, who were added between July 7 and August 16, according to the online threat website HackNotice.
By listing the victims on their website, the Ragnarok team tried to force them to pay a ransom, under the threat of leaking the unencrypted files stolen during duration of the invasion.
The compromised companies are from France, Estonia, Sri Lanka, Turkey, Thailand, the US, Malaysia, Hong Kong, Spain and Italy and operate in a variety of sectors, from construction to legal services.