Thanatos Ransomware's free decryption tool

If your computer is infected with Thanatos Ransomware and you are looking for a solution, before paying ransom, try a free decryption tool from Cisco Talos to decrypt the you.

Cisco Talos security researchers have discovered a flaw in the Thanatos ransomware code that allows victims to unlock their encrypted files without paying a ransom to the criminals.

Like all ransomware threats, Thanatos encrypts files and asks its victims to ransom multiple cryptosystems, including Bitcoin Cash (BCH), Zcash (ZEC), Ethereum (ETH) and others, to decrypt their files. Once a computer is infected, all infected encrypted file extensions end up in .THANATOS, and then a ransom note appears, giving instructions on where to send the money to decrypt the files.

However, because Thanatos uses a different system of different encryption keys for each file, and without storing them somewhere, it is impossible for malicious programmers to send the passwords, even if the victims pay the ransom.

Cisco researchers analyzed malware code and found a loophole in the design of the Thanatos file encryption methodology, based on which they developed a free ransomware decryption tool to help victims decrypt their files. It is called Thanatos , is completely free, you can download it from GitHub website, and works for versions 1 and 1.1 of Thanatos ransomware

Since the encryption keys used by Thanatos are based on the number of milliseconds since the last boot of the system, the researchers were able to reverse this logic and recreate the same 32-bit encryption key using brute force attack and Windows Event Logs. For more details on ransoware Thanatos, you can refer in the detailed article published yesterday by Cisco Talos.

To decrypt your encrypted files from Thanatos Ransomware, you need to download Thanatos Decryptor and save it to your. You also need to make sure you have the Microsoft Visual C ++ Redistributable for Visual Studio 2017 otherwise when you try to run Dectyptor you will see an error about missing DLLs.

Once you have everything you need, simply double-click the executable (exe) file and o it will start searching for files to decrypt. It will only decrypt the following file types:

Image: .gif, .tif, .tiff, .jpg, .jpeg, .png
Video: .mpg, .mpeg, .mp4, .avi
Sound: .wav
Document: .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pdf, .odt, .ods, .odp, .rtf
Other: .zip, .7z, .vmdk, .psd, .lnk

Cisco recommends that you run the decryptor on the same computer where the files were encrypted. THE decryption may take some time, so be patient.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).