Tuesday, April 22, 2025
HomeComputer SecurityEnd of GandCrab - New Free Decryptor Tool that let Victims to...

End of GandCrab – New Free Decryptor Tool that let Victims to Unlock All versions of Ransomware Infection

Published on

SIEM as a Service

Follow Us on Google News

Decryptor tool released for the notorious GandCrab ransomware let’s victim’s to unlock the files infected with any version of GandCrab. The tools are available to download form Bitdefender and No More Ransom Project.

Bitdefender, along with law enforcement agencies managed to offer several decryptors to help GandCrab victims get their data back for free.

“These tools totaled more than 30,000 successful decryptions and have saved victims roughly $US 50 MILLION in unpaid ransom,” also it cuts the ransomware operators monetization options.

- Advertisement - Google News

GandCrab a Look Back

The ransomware strain first spotted in January 2018; it is the most sophisticated and continuously changing ransomware. It grabs more than 50% of infection in market share by August 2018.

It was sold by threat actors in the dark web to affiliates for infecting the victims, and to collect ransom payments from them. The affiliates need to give 40% of their profit to the GandCrab developers.

According to Bitdefender, GandCrab has infected more than 1.5 million victims around the world, both home users and corporations.

The ransomware was distributed through multiple vectors that include malicious spam emails, exploit kits, social Engineering methods, and other malware campaigns.

Starting this month, the threat actors posted an announcement says they have stopped promoting the ransomware and asked affiliates to stop distribution of ransomware within 20 days. Also, it urged victim’s to pay the ransom; else the key will get deleted.

GandCrab sets ransom payments based on the victim’s type, an average computer costs from $600 and $2,000 to decrypt, and server decryption costs $10,000 and more.

Ransomware has always been a threat for cybersecurity professionals, with new variants and types developed every day; this has become a never-ending routine for IT, administrators, to prevent them from causing havoc to their business.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

GandCrab Ransomware Attacks 

Torrents Sites Banned A Famous “CrackNow” Torrent Uploader that sharing GandCrab Ransomware

Hackers Launching Gandcrab Ransomware via Super Mario Image Using Weaponized Excel Document

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Magecart Launches New Attack Using Malicious JavaScript to Steal Credit Card Data

The notorious Magecart group has been identified by the Yarix Incident Response Team as...

Japan Sounds Alarm Over Hackers Draining Millions from Compromised Trading Accounts

Cybersecurity in Japan has hit a new low as the Financial Services Agency (FSA)...