Ransomware causes many sleepless nights to companies world-wide, but now decryption codes have risen on the internet to put an end to the nightmare of many versions of malware.
I’ll show you where to find the keys to decrypt your data!
The toolkit EDA2 was originally created to demonstrate how ransomware works. When creating common ransomware, such as some versions of Locky, this toolkit has been used as a basis.
The author of the toolkit, Utku Sen, implemented a backdoor in his code to prevent abuse.
The developers used EDA2 as a base for the extortion software, and implemented unwittingly a mechanism which makes their own malicious code harmless (the developers of the ransomware didn’t know about this hidden vulnerability).
Many versions of common ransomware can be decrypted using the following published keys. A list of the published decryption keys can be found here:
Use Cybytes and
Tip the Author!
Ready to share your knowledge and expertise?