New Decryptor Unlocks CryptXXX v3 Files

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
Researchers have neutralized the threat of the latest strain of the CryptXXX v.3 ransomware, releasing a decryption tool for unlocking files, and have added it to the RannohDecryptor, a free utility hosted by Kaspersky Lab’s No Ransom Project.

Previous decryption tools had been available for partial list of files locked up by CryptXXX v.3, but the latest goes a step further and recovers all files scrambled by the ransomware.

The utility deals a blow to cybercriminals behind this latest CryptXXX ransomware, considered one of the most active ransomware families in the wild today. Approximately one quarter of CryptXXX victims are based in the United States; with Russia, Germany and Japan among other top targeted geographic regions.

In April, researchers published a decryption tool for unscrambling files locked by an earlier version of CryptXXX. By June, cybercriminals had updated CryptXXX to outsmart those decryption tools and added a new credential-stealing module. At the time, Proofpoint researchers said CryptXXX authors were on track to rival Locky’s infection rates and distribution reach.

With the first version of CryptXXX, researchers were able to exploit a critical flaw in the encryption algorithm to create a decryption tool. With the CryptXXX v.2, ransomware authors updated the code, but still left flaws that Kaspersky Lab was able to leverage to create another updated decryption tool. With CyrptXXX v.3, the utility decrypts files locked by v.2 and v.3 of the ransomware.

According to Kaspersky Lab researchers, the CryptXXX malware is a DLL (dynamic-link library) written in Delphi and uses a variety of different encryption algorithms to attack files. Kaspersky Lab described three encryption methods the malware uses including RC4 with one key for all files, and two others that use RC4 and RSA to encrypt the content of files and the RC4 keys, or a combination of RC4 and RSA where RC4 is used to encrypt the content of files and RSA is used to encrypt some file contents and the RC4 keys.

CryptXXX v.3 locks files using the extensions .crypt, .cryp1 and .crypz.


Read more: New Decryptor Unlocks CryptXXX v3 Files
 

conceptualclarity

Level 21
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Aug 23, 2013
1,076
Here are important nuggets from a previous article there:

CryptXXX is particularly nasty because it not only encrypts local files (encrypted files have a .crypt extension), but also those on all attached storage shortly after the initial infection...

Sinitsyn said, the decryptor requires at least one original copy of a file encrypted by CryptXXX.

“If given a correct pair, the utility will decrypt all files with size less than or equal to the size of the file from the pair,” Sinitsyn said. “Most of the time the victim manages to find an original copy of one encrypted file. It can be on a disconnected flash drive, external hard drive, in their mailbox, in a cloud storage, on another PC, etc. In case of CryptXXX, if the victim finds a large original, it will allow to decrypt all affected files of this size or smaller.”

So you need to have a copy of a large file on cloud storage or a disconnected flash drive. You're probably out of luck with only a connected external hard drive.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top