Saturday, November 16, 2024
HomeCryptocurrency hackFinally Petya Ransomware Original Author Janus Released His Private Key and ...

Finally Petya Ransomware Original Author Janus Released His Private Key and Decided to Shut down the Petya Project

Published on

An another Historical Petya Ransomware after wanna cry Chapter Finally come to an end. An author of  Petya  came out and released the  Master Decryption Key to shut down the Petya Project.

This Master Decryption Key help to all the Petya Ransomware Victims to get back their Encrypted Files.

Released Master Decryption Key only work for Petaya variant. it will not work for NotPetya (ExPetr and Eternal Petya).because the NotPetya ransomware modifying the behavior of the original Petya ransomware by using Patching Process.

- Advertisement - SIEM as a Service

NotPetya has Different Encryption method and there is no relation with Original Petya Ransomware.

Also Read   A Fileless Ransomware Called “SOREBRECT” Discovered with Code Injection Capability that Encrypts local and Network Share Files

Janus REvelaed about this Decryption key Released via his tweet that,” They’re right in front of you and can open very large doors”

He  Uploaded Petya Ransomware Decryption key in MEGA Cloud where everyone can access and Download the Master Private key of the Petya Ransomware and all the affected Victims use this Key and get back their Encrypted files.

Private key Successfully Tested and confirmed the Authenticity

According to Kaspersky Lab security researcher Anton Ivanov The Master Private Key successfully tested and confirmed the master key’s validity.

He mentioned in his tweets published Petya master key works for all versions including GoldenEye.

Malwarebytes security researcher Hasherezade cracked the file yesterday and shared its content of the Cracked Result.

Congratulations!
Here is our secp192k1 privkey:
38dd46801ce61883433048d6d8c6ab8be18654a2695b4723
We used ECIES (with AES-256-ECB) Scheme to encrypt the decryption password into the “Personal Code” which is BASE58 encoded.

According to Malwarebytes, the original author of Petya, Janus, was not involved in the latest attacks on Ukraine. His original malware was pirated and extended by an unknown actor.

Also Read    Vault 7 Leaks : CIA Hacking Tools “BothanSpy” and “Gyrfalcon” Steals SSH Credentials From Windows and Linux Computers – WikiLeaks

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools

Ransomware-as-a-Service (RaaS) platforms have revolutionized the ransomware market.Unlike traditional standalone ransomware sales, RaaS...