Wednesday, January 1, 2025
HomeComputer SecurityEnd of GandCrab - New Free Decryptor Tool that let Victims to...

End of GandCrab – New Free Decryptor Tool that let Victims to Unlock All versions of Ransomware Infection

Published on

SIEM as a Service

Decryptor tool released for the notorious GandCrab ransomware let’s victim’s to unlock the files infected with any version of GandCrab. The tools are available to download form Bitdefender and No More Ransom Project.

Bitdefender, along with law enforcement agencies managed to offer several decryptors to help GandCrab victims get their data back for free.

“These tools totaled more than 30,000 successful decryptions and have saved victims roughly $US 50 MILLION in unpaid ransom,” also it cuts the ransomware operators monetization options.

- Advertisement - SIEM as a Service

GandCrab a Look Back

The ransomware strain first spotted in January 2018; it is the most sophisticated and continuously changing ransomware. It grabs more than 50% of infection in market share by August 2018.

It was sold by threat actors in the dark web to affiliates for infecting the victims, and to collect ransom payments from them. The affiliates need to give 40% of their profit to the GandCrab developers.

According to Bitdefender, GandCrab has infected more than 1.5 million victims around the world, both home users and corporations.

The ransomware was distributed through multiple vectors that include malicious spam emails, exploit kits, social Engineering methods, and other malware campaigns.

Starting this month, the threat actors posted an announcement says they have stopped promoting the ransomware and asked affiliates to stop distribution of ransomware within 20 days. Also, it urged victim’s to pay the ransom; else the key will get deleted.

GandCrab sets ransom payments based on the victim’s type, an average computer costs from $600 and $2,000 to decrypt, and server decryption costs $10,000 and more.

Ransomware has always been a threat for cybersecurity professionals, with new variants and types developed every day; this has become a never-ending routine for IT, administrators, to prevent them from causing havoc to their business.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

GandCrab Ransomware Attacks 

Torrents Sites Banned A Famous “CrackNow” Torrent Uploader that sharing GandCrab Ransomware

Hackers Launching Gandcrab Ransomware via Super Mario Image Using Weaponized Excel Document

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application...

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on...

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury...

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake "Army+" application...

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File

The watering hole attack leverages a compromised website to deliver malware. When a user...

AT&T and Verizon Hacked – Salt Typhoon Compromised The Network For High Profiles

AT&T and Verizon Communications, two of America's largest telecommunications providers, have confirmed they were...