Categories: NewsSecurity

Original Petya Developer Releases Master Decryption Key for all Variants

Over the past year or so, we have seen multiple ransomware developers suddenly give up. Free decryption of files for the victims of one of the most popular ransomwares does not happen all that often, so it is big news when this does happen. Petya, also known as Mischa and GoldenEye, is no longer a threat officially. The developer published the master decryption key, which makes restoring file access a lot easier.

Janus Cybercrime Solutions Gives up Petya Key

In a surprising turn of events, Petya and all of its variants are no longer an actual threat to computer users. The developer released the master decryption key. It is unclear why Janus Cybercrime Solutions decided to do this, as Petya and its variants have been widely successful over the past few years.

The master decryption key can be used to decrypt all three existing Petya Strains. This includes the Mischa and GoldenEye ransomware, both of which use the exact same code base as Petya. These latter two are also evolutions of the original malware, with new features added on top and other small code changes. Sadly, this key will not work for the NotPetya strain, since that one is not developed by Janus Cybercrime Solutions.

The validity of this master key has been determined by Kaspersky Lab. The ransomeware developers surrendered, but no one knows why. Given the wide variety of ransomware types in circulation right now, the competition is certainly heating up. Popular and prominent malware strains will always have their place in the market. Petya was on that list, until a few days ago.

Related Post

One challenge remains as security researchers need to develop a decryption tool which makes use of this master key. Even though Petya encryption has been cracked numerous times already, the master decryption key-based tool will decrypt files a lot quicker. Victims want to regain access to their device and its associated files sooner rather than later. It is unclear who will build this new tool or when it will be released.

The master decryption key will be less useful than what many may think. With the majority of Petya attacks taking place in 2016, many victims have already moved on. The chance is very likely their computer files have been erased already. This does not mean one should not build a decryption tool from the master key, but it remains doubtful there will be many use cases for it anytime soon.

NotPetya victims will be rather disappointed this decryption key will do nothing for them. Since NotPetya was created by different developers, there is no chance that this master key will work for any other ransomware. There is no viable decryption tool available for NotPetya as of right now. It seems like for every major threat that goes away, half a dozen new ones pop up.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Published by
JP Buntinx

Recent Posts

Top 5 Hottest Metaverse Projects Right Now

As the Metaverse trend picks up, we see more and more emerging projects entering the…

59 mins ago

Embr’s Innovative CeDeFi Ecosystem Aims to Provide Long-term Value To Investors

There has been a lot of discussion about decentralization and why it is essential for…

16 hours ago

Top 5 Yield Farming Coins to Watch In 2022

With the recent boom of Metaverse and Meme coins, it seems that Yield Farming projects…

20 hours ago

Shiba Inu Price Up 5%, Gemini Adds SHIB to Its Platform

Shiba Inu price is up 5% today, peaking at $0.00005592 with a low of $0.00005235.…

1 day ago

5 Metaverse Coins Valued Under $100 Million

With metaverse applications being the next big trend in crypto, there are still a lot…

1 day ago

The Work From Home Revolution Has Arrived

With many employers and employees acknowledging the feasibility of remote work, the possibility of it…

1 day ago

This website uses cookies.