Crysis Ransomware keys has been released

  • 1.4K
  •  
  •  
  •  
  •  
  •  
  •  
    1.4K
    Shares

Crysis is a malicious code whose purpose, as its name suggests, is to encrypt data and demand the payment of a ransom in exchange for the return of the encrypted data. Crysis uses RSA and AES encryption with long encryption keys, and that makes the recovery of the files nearly impossible.

If you haven’t already deleted files that encrypted with the Crysis ransomware, you are so lucky. About 200 master keys can now be used by victims to decrypt and unlock the encrypted files.

The keys have been uploaded to Pastebin (the number one paste tool since 2002), security researchers confirmed that the keys are valid and can decrypt the infected files. Some users also confirmed that the keys are worked, and they were able to access the files.

Ransomware is a particularly evil form of malware which, once executed on a vulnerable PC, encrypts files and locks users out of their system.

It’s not the first time that ransomware keys released to the public. A year ago, the TeslaCrypt ransomware did the same thing.

ESET researchers said. “Since the last set of decryption keys was published, Crysis ransomware attacks have been detected by our systems over ten thousand times.”

If your device has been infected with this ransomware, ESET company has taken the latest Crysis keys and developed a decryption tool that you can download here.

The following two tabs change content below.
Avatar

Unallocated Author

Please note that the article you are reading has an unallocated author as the original author is no longer employed at latesthackingnews.com, this has been put in place to adhere with general data protection regulations (GDPR). If you have any further queries, please contact: [email protected]
Avatar

Latest posts by Unallocated Author (see all)

Avatar

Unallocated Author

Please note that the article you are reading has an unallocated author as the original author is no longer employed at latesthackingnews.com, this has been put in place to adhere with general data protection regulations (GDPR). If you have any further queries, please contact: [email protected]

Do NOT follow this link or you will be banned from the site!