- Apr 21, 2016
- 4,370
Just as ransomware has rapidly turned into a full-on phenomenon, the war against this type of cyber attacks has grown too. In fact, Avast announced a brand new decryptor tool for the AES_NI ransomware, possible thanks to the public dump of the master private key a few days ago.
This particular ransomware family was first spotted in December 2016, with multiple variants having been detected in the wild since then. You can tell if you've been attacked by it if your encrypted files have one of these file extensions - example.docx.aes_ni, example.docx.aes256, or example.docx.aes_ni_0day.
As Avast's researchers explain, the ransomware generates an RSA session key for each machine it infects. This session key is then encrypted and saved to a file to the Program Data folder.
Read more: Avast Releases AES_NI Ransomware Decrytor After Author Dumps Master Keys
This particular ransomware family was first spotted in December 2016, with multiple variants having been detected in the wild since then. You can tell if you've been attacked by it if your encrypted files have one of these file extensions - example.docx.aes_ni, example.docx.aes256, or example.docx.aes_ni_0day.
As Avast's researchers explain, the ransomware generates an RSA session key for each machine it infects. This session key is then encrypted and saved to a file to the Program Data folder.
Read more: Avast Releases AES_NI Ransomware Decrytor After Author Dumps Master Keys
Last edited by a moderator: