Monday, April 28, 2025
HomeCyber Security NewsPolice Tricked Ransomware Gang to Obtain More than 150 Decryption Keys

Police Tricked Ransomware Gang to Obtain More than 150 Decryption Keys

Published on

SIEM as a Service

Follow Us on Google News

The Dutch National Police in cooperation with cybersecurity firm Responders.NU, managed to obtain over 150 decryption keys from ransomware group ‘Deadbolt’ due to fake bitcoin payments.

“The police paid, received the decryption keys and then withdrew the payments. These keys allow files such as treasured photos or administration to be unlocked again, at no cost to victims”, according to the news release.

Bitcoin transaction's OP_RETURN output containing decryption key
Bitcoin transaction’s OP_RETURN output with decryption key

The DEADBOLT ransomware targets vulnerabilities in the products of well-known NAS vendor QNAP, the DEADBOLT gang aims to lock everyone else on your network out of their digital lives, and then to squeeze you for several thousand dollars to “recover” your data.

- Advertisement - Google News

Once the ransom is paid, DeadBolt creates a bitcoin transaction to the same bitcoin ransom address containing a decryption key for the victim- the decryption key can be found under the transaction’s OP_RETURN output.

Subsequently, after the victim enters this key, it will be converted into a SHA256 hash and compared to the SHA256 hash of the victim’s decryption key and the SHA256 hash of the DeadBolt master decryption key.

Thus, if the decryption key matches one of the SHA256 hashes, the encrypted files on the NAS hard drives will get decrypted.

According to the reports, about 90% of the keys of victims that filed complaint in one of the thirteen countries were obtained. In this case, when a victim makes a ransom payment to the DeadBolt operation, the operation automatically sends a decryption key when it detects the bitcoin transaction with the exact ransom amount.

Still, the decryption key is sent immediately without waiting for a bitcoin confirmation that the bitcoin transaction is legitimate. Thus, Dutch Police and Responders.NU create ransom payments with a low fee at a time when the Bitcoin blockchain was heavily congested.

Report says the action is a nasty blow for the cybercriminals behind Deadbolt: because of the weak link in their operation they were forced to shut down their system. Specifically, they are in the crosshairs of international law enforcement authorities.

“This action clearly shows that reporting helps: victims that reported the ransomware were given priority. Their keys were among the first we obtained, before panic struck the ransomware-group. 

“On top of the international victims, we were able to obtain the keys for all the Dutch victims that filed a complaint and have notified them the very evening”, Matthijs Jaspers, Cyber ​​crime team police

Rickey Gevers, Responders.NU says, “We assist many victims of ransomware and saw an opportunity to obtain decryption keys. Through the website deadbolt.responders.nu, victims can easily check if their key is also available and follow the unlocking instructions.”

Also Read: Download Secure Web Filtering – Free E-book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...