Thursday, January 30, 2025
HomeCryptocurrency hackFinally Petya Ransomware Original Author Janus Released His Private Key and ...

Finally Petya Ransomware Original Author Janus Released His Private Key and Decided to Shut down the Petya Project

Published on

SIEM as a Service

Follow Us on Google News

An another Historical Petya Ransomware after wanna cry Chapter Finally come to an end. An author of  Petya  came out and released the  Master Decryption Key to shut down the Petya Project.

This Master Decryption Key help to all the Petya Ransomware Victims to get back their Encrypted Files.

Released Master Decryption Key only work for Petaya variant. it will not work for NotPetya (ExPetr and Eternal Petya).because the NotPetya ransomware modifying the behavior of the original Petya ransomware by using Patching Process.

NotPetya has Different Encryption method and there is no relation with Original Petya Ransomware.

Also Read   A Fileless Ransomware Called “SOREBRECT” Discovered with Code Injection Capability that Encrypts local and Network Share Files

Janus REvelaed about this Decryption key Released via his tweet that,” They’re right in front of you and can open very large doors”

He  Uploaded Petya Ransomware Decryption key in MEGA Cloud where everyone can access and Download the Master Private key of the Petya Ransomware and all the affected Victims use this Key and get back their Encrypted files.

Private key Successfully Tested and confirmed the Authenticity

According to Kaspersky Lab security researcher Anton Ivanov The Master Private Key successfully tested and confirmed the master key’s validity.

He mentioned in his tweets published Petya master key works for all versions including GoldenEye.

Malwarebytes security researcher Hasherezade cracked the file yesterday and shared its content of the Cracked Result.

Congratulations!
Here is our secp192k1 privkey:
38dd46801ce61883433048d6d8c6ab8be18654a2695b4723
We used ECIES (with AES-256-ECB) Scheme to encrypt the decryption password into the “Personal Code” which is BASE58 encoded.

According to Malwarebytes, the original author of Petya, Janus, was not involved in the latest attacks on Ukraine. His original malware was pirated and extended by an unknown actor.

Also Read    Vault 7 Leaks : CIA Hacking Tools “BothanSpy” and “Gyrfalcon” Steals SSH Credentials From Windows and Linux Computers – WikiLeaks

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Lynx Ransomware Architecture to Attack Windows, Linux, ESXi Uncovered

The emergence of the Lynx Ransomware-as-a-Service (RaaS) platform has drawn significant attention in cybersecurity...

Hellcat Ransomware Attacking Government Organizations & Educational Institutions

A new ransomware gang, Hellcat, emerged on dark web forums in 2024, targeting critical...

New Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

Researchers have identified a sophisticated phishing tactic leveraging Cloudflare's workers.dev, a free domain name...