Skip to comments.
Kaspersky releases tools to decrypt files encrypted with CoinVault Ransomware
TechWorm ^
| on April 14, 2015
| Abhishek Kumar Jha
Posted on 04/14/2015 6:46:32 PM PDT by Utilizer
Software security group Kaspesky labs in collaboration with the Dutch police has released a tool which helps to decrypt files locked by Ransomware.
Kaspersky Labs has released a decryption tool for files encrypted with CoinVault ransomware. The tool was developed by the Kaspersky lab after the The National High Tech Crime Unit (NHTCU) of the Dutch police handed over the information obtained from a database of CoinVault command-and-control server containing the decryption keys.
(Excerpt) Read more at techworm.net ...
TOPICS: Business/Economy; Computers/Internet
KEYWORDS: adware; computers; computing; internet; malware; ransomware; security; windowspinglist
Navigation: use the links below to view more comments.
first 1-20, 21 next last
Site has direct link to the Kapersky release.
1
posted on
04/14/2015 6:46:33 PM PDT
by
Utilizer
To: All
2
posted on
04/14/2015 6:47:53 PM PDT
by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
To: ShadowAce
3
posted on
04/14/2015 6:48:24 PM PDT
by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
To: dayglored
4
posted on
04/14/2015 6:49:45 PM PDT
by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
To: Utilizer
So they either found the base server with the private key or the hackers used and extraordinarily poor hash (i.e. MD5) that was easily cracked. Otherwise, this isn’t something that can be permuted in a short period without some help.
5
posted on
04/14/2015 7:34:32 PM PDT
by
rarestia
(It's time to water the Tree of Liberty.)
To: Utilizer
6
posted on
04/14/2015 7:35:22 PM PDT
by
NeverEVERKerry
(I AM JIM THOMPSON!)
To: Utilizer; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; Alas Babylon!; amigatec; ...
Kaspersky has tools to deal with Ransomware ... PING!
You can find all the Windows Ping list threads with FR search: search on keyword "windowspinglist".
Thanks to Utilizer for the heads-up!
7
posted on
04/14/2015 7:50:21 PM PDT
by
dayglored
(Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
To: NeverEVERKerry
This is mighty generous of this company. I’ll bet every victim becomes a customer of theirs.
8
posted on
04/14/2015 8:03:01 PM PDT
by
The Antiyuppie
("When small men cast long shadows, then it is very late in the day".)
To: rarestia
Or Kaspersky was behind it : )
Those Russians...
To: rarestia
It might not have been all that easily cracked, but at least someone finally found a solution so kudos to Kapersky.
10
posted on
04/14/2015 8:23:05 PM PDT
by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
To: NeverEVERKerry
Let’s hope it is not simply a temporary solution.
11
posted on
04/14/2015 8:23:39 PM PDT
by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
To: dayglored
We need to send this info to critical system operations people, such as hospitals and healthcare professionals. Some educational institutions were attacked as well, if I recall correctly.
12
posted on
04/14/2015 8:26:38 PM PDT
by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
To: Utilizer
13
posted on
04/14/2015 8:34:49 PM PDT
by
Robert357
(D.Rather "Hoist with his own petard!" www.freerepublic.com/focus/f-news/1223916/posts)
To: Utilizer
>
Lets hope it is not simply a temporary solution. Well, yes; but every solution in this arena is temporary by definition.
14
posted on
04/14/2015 8:50:39 PM PDT
by
dayglored
(Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
To: Utilizer
Sad that domestic companies do not solve big issues like this. I found it suspicious that Kapersky cracked the Stuxnet worm, yet domestic companies acted like they didn’t even know about it. Almost like they are told what to fix and what to ignore.
15
posted on
04/14/2015 9:17:03 PM PDT
by
FreeInWV
(Have you had enough change yet?)
To: minnesota_bound
16
posted on
04/14/2015 9:20:51 PM PDT
by
dfwgator
To: Utilizer
If FreeRepublic encrypted everyone’s files and charged a ransom to get them released there would never have to be another fundraiser.
17
posted on
04/14/2015 9:28:56 PM PDT
by
AlaskaErik
(I served and protected my country for 31 years. Progressives spent that time trying to destroy it.)
To: AlaskaErik
JimRob and John have too much class to act like the Infernal Rectalviewing Sphincterprobes.
18
posted on
04/14/2015 9:39:56 PM PDT
by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
To: FreeInWV
*snort* Micronoodle has been doing the same thing with many of the security issues that regularly come up on the ‘doze platform. It’s oftentimes been the ‘nix coders that have discovered problems and issued notices concerning them and patches with MS rarely acknowledging that there was a problem at all.
19
posted on
04/14/2015 9:43:33 PM PDT
by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
To: Utilizer
Damned crypto-viruses. I get at least one service call a week for them. We can remove them, but we tell the end users that their files are dog chow. When they authorize us to run a decryption app, we'll give it a whirl.
20
posted on
04/14/2015 11:17:44 PM PDT
by
Viking2002
(The Avatar is back by popular request.)
Navigation: use the links below to view more comments.
first 1-20, 21 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson