Wednesday, May 29, 2024

Shade Ransomware Hackers Shutdown Their Operation – 750k Decryption Keys Released

Shade ransomware first spotted in late 2014, also known as Troldesh or Encoder.858. The ransomware distributed specifically through malicious email attachments.

The origin of the ransomware believed to be from Russia, the ransom notes found to be written in both Russian and English.

The threat actors behind the ransomware strain continue to enhance their capabilities. The following are the top industries targeted that include High-Tech, Wholesale, and Education.

Researchers believe the ransomware is possibly targeting more English-speaking users, once the files encrypted it appends [.crypted000007] extension at the end.

In the late 2019 Shade ransomware operators have stopped distribution of the ransomware.

Shade Ransomware Shutdown

The operators behind the Shade ransomware announced the shutdown of the ransomware now and they also published all the decryption keys.

Along with decryption keys they also publish decryption software to helps users to decrypt the encrypted files.

“All other data related to our activity (including the source codes of the trojan) was irrevocably destroyed. We apologize to all the victims of the trojan and hope that the keys we published will help them to recover their data,” reads the GitHub post published.

“We also hope that having the keys, antivirus companies will issue their own more user-friendly decryption tools.”

Also, the Shade ransomware operators believe the published keys will help the victims of the ransomware to decrypt the files and recover their data.

Shade Ransomware
Shade Ransomware keys

The ransomware operators also published detailed instructions on how to decrypt the files.

Kaspersky Lab’s Sergey Golovanov said that the key is working and the decryption tools will be available soon.

You can also read the complete ransomware mitigation checklist

Website

Latest articles

Researchers Exploited Nexus Repository Using Directory Traversal Vulnerability

Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes.The...

DDNS Service In Fortinet Or QNAP Embedded Devices Exposes Sensitive Data, Researchers Warn

Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting...

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS)...

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to...

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles