{"id":25349,"date":"2014-08-06T21:44:07","date_gmt":"2014-08-07T01:44:07","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25349"},"modified":"2014-08-06T21:44:07","modified_gmt":"2014-08-07T01:44:07","slug":"cryptolocker-decrypted-researchers-reveal-website-that-frees-your-files-from-ransomware","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/cryptolocker-decrypted-researchers-reveal-website-that-frees-your-files-from-ransomware.php","title":{"rendered":"CryptoLocker decrypted: Researchers reveal website that frees your files from ransomware"},"content":{"rendered":"<p><p>    The    CryptoLocker ransomware is as simple as it is devastating: Once    it worms its way onto your system, it encrypts all of your    precious files using strong AES-256-bit cryptography, which is    virtually impossible to break if you dont know the private key    (read: secret code) required to unlock it. Pay the attackers    $300, and theyll give you the key. Dont pay, and your files    stay scrambled forever.  <\/p>\n<p>    Until    now.  <\/p>\n<p>    Researchers from FireEye and Fox-IT have managed to recover    the private encryption keys used by CryptoLockers authors, as    well as reverse-engineer the code powering the malware    itselfmeaning the firms can unlock your files. And while they    could no doubt make a pretty penny selling that service to    victims at a price far less than CryptoLockers $300 Bitcoin    ransom, the security firms are taking the high road, and    providing the private key details for free via the    just-launched Decrypt CryptoLocker    website.  <\/p>\n<p>    Screenshot of a PC infected with CryptoLocker.  <\/p>\n<p>    The    process couldnt be easier: Simply send the site one of the    CryptoLocker-encrypted files on your PC, along with an email    address. Itll scan the file to figure out the encryption    specifics, then send you a recovery program and master key that    can be used to rescue your ransomed data.  <\/p>\n<p>        FireEye warns that some data might not be recoverable,    particularly if youve been infected by a     CryptoLocker variant rather than CryptoLocker    itself.  <\/p>\n<p>    BBC    reports that 500,000 people fell victim to CryptoLocker,    with 1.3 percent forking over cash to free their files. In    other words, the malware earned its makers around $3 million    before the criminal network was smashed by authorities and    security researchers in May.  <\/p>\n<p>    Variants are still scuttling around the web, however. Beyond    usingsecurity    software and     safe browsing practices, the best offense against    ransomware is a strong defense.     Making regular backups will let you easily recover your    data if your PC ever     falls prey to an encryption-based attack.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2462280\/cryptolocker-decrypted-researchers-reveal-website-that-frees-your-files-from-ransomware.html\/RK=0\/RS=jvBIHRJwU2OiFAjM_BzibHdKNuc-\" title=\"CryptoLocker decrypted: Researchers reveal website that frees your files from ransomware\">CryptoLocker decrypted: Researchers reveal website that frees your files from ransomware<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The CryptoLocker ransomware is as simple as it is devastating: Once it worms its way onto your system, it encrypts all of your precious files using strong AES-256-bit cryptography, which is virtually impossible to break if you dont know the private key (read: secret code) required to unlock it. Pay the attackers $300, and theyll give you the key. Dont pay, and your files stay scrambled forever. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-25349","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25349"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25349"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25349\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}