Categories: Cyber Security News

Police Tricked Ransomware Gang to Obtain More than 150 Decryption Keys

The Dutch National Police in cooperation with cybersecurity firm Responders.NU, managed to obtain over 150 decryption keys from ransomware group ‘Deadbolt’ due to fake bitcoin payments.

“The police paid, received the decryption keys and then withdrew the payments. These keys allow files such as treasured photos or administration to be unlocked again, at no cost to victims”, according to the news release.

Bitcoin transaction’s OP_RETURN output with decryption key

The DEADBOLT ransomware targets vulnerabilities in the products of well-known NAS vendor QNAP, the DEADBOLT gang aims to lock everyone else on your network out of their digital lives, and then to squeeze you for several thousand dollars to “recover” your data.

Once the ransom is paid, DeadBolt creates a bitcoin transaction to the same bitcoin ransom address containing a decryption key for the victim- the decryption key can be found under the transaction’s OP_RETURN output.

Subsequently, after the victim enters this key, it will be converted into a SHA256 hash and compared to the SHA256 hash of the victim’s decryption key and the SHA256 hash of the DeadBolt master decryption key.

Thus, if the decryption key matches one of the SHA256 hashes, the encrypted files on the NAS hard drives will get decrypted.

According to the reports, about 90% of the keys of victims that filed complaint in one of the thirteen countries were obtained. In this case, when a victim makes a ransom payment to the DeadBolt operation, the operation automatically sends a decryption key when it detects the bitcoin transaction with the exact ransom amount.

Still, the decryption key is sent immediately without waiting for a bitcoin confirmation that the bitcoin transaction is legitimate. Thus, Dutch Police and Responders.NU create ransom payments with a low fee at a time when the Bitcoin blockchain was heavily congested.

Report says the action is a nasty blow for the cybercriminals behind Deadbolt: because of the weak link in their operation they were forced to shut down their system. Specifically, they are in the crosshairs of international law enforcement authorities.

“This action clearly shows that reporting helps: victims that reported the ransomware were given priority. Their keys were among the first we obtained, before panic struck the ransomware-group. 

“On top of the international victims, we were able to obtain the keys for all the Dutch victims that filed a complaint and have notified them the very evening”, Matthijs Jaspers, Cyber ​​crime team police

Rickey Gevers, Responders.NU says, “We assist many victims of ransomware and saw an opportunity to obtain decryption keys. Through the website deadbolt.responders.nu, victims can easily check if their key is also available and follow the unlocking instructions.”

Also Read: Download Secure Web Filtering – Free E-book

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

8 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

8 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

11 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

14 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

15 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

16 hours ago