A new decryption tool released last week for the latest version of the most prolific ransomware family GandCrab.
This tool allows victims of ransomware to regain access to their information encrypted by hackers, without having to pay demanded ransoms.
The tool is released by nomoreransomware.org in partnership with law enforcement agencies from Austria (Bundeskriminalambt – BMI), Belgium (Federal Computer Crime Unit), Bulgaria (General Directorate Combating Organized Crime – Cybercrime Department), France (Police Judiciaire de Paris – Befti), Germany (LKA Baden-Württemberg), the Netherlands (High Tech Crime Unit), Romania (DIICOT), the United Kingdom (NCA and Metropolitan Police), the United States (FBI) and Europol and its Joint Cybercrime Action Taskforce (J-CAT), together with the private partner Bitdefender.
The decryption tool counters versions 1 and 4 and versions 5 to 5.2, which are the latest to be used by cybercriminals.
Previous decryptors for the GandCrab ransomware have helped more than 30 000 victims recover their data and save roughly $50 million in unpaid ransoms. Most importantly, the joint efforts have weakened the operators’ position on the market and have led to the demise and shutdown of the operation by law enforcement. This shutdown was a global law enforcement effort supported by Bitdefender and McAfee.
Launched in January 2018, GandCrab quickly became the go-to tool for hackers for affiliate-based ransomware, holding 50 percent share of all the ransomware market by mid-2018. Set as a ransomware-as-a-service licensing model, distributors could buy the ransomware on dark web markets and spread it among their victims. In exchange, they would pay 40 percent of their profit to the GandCrab developers and keep 60 percent for themselves. The GandCrab operators recently claimed they have extorted more than $2 billion from victims.
Click here to download the free tool.
The best cure against ransomware remains diligent prevention. Users should:
• Always keep a copy of their most important files somewhere else: In the cloud, on another drive, on a memory stick, or on another computer
• Use reliable and up-to-date anti-virus software
• Not download programs from suspicious sources
• Not open attachments in emails from unknown senders, even if they look important and credible
• Don’t pay the ransom if you are a ransomware victim