Regarding Sicarii’s broken decryption process, researchers said that “during execution, the malware regenerates a new RSA key pair locally, uses the newly generated key material for encryption, and then discards the private key.”

    • SmoothLiquidation@lemmy.world
      link
      fedilink
      English
      arrow-up
      90
      ·
      1 month ago

      I bet other ransomware creators hate this. If victims can’t even get their data back by paying, more victims will stop paying across the board.

  • Cevilia (they/she/…)
    link
    fedilink
    English
    arrow-up
    76
    ·
    1 month ago

    Even if the malware author did correct the issue, it’s unknown whether those already compromised can benefit, or if they’re out of luck.

    They literally said the private key was discarded. It’s absolutely known whether those already compromised can benefit. They can’t.

    • Natanael@infosec.pub
      link
      fedilink
      arrow-up
      13
      ·
      1 month ago

      Well, unless they also made key generation shitty, because that’s equally plausible and would likely allow RSA keys to be broken (it’s surprisingly hard to generate RSA keys safely)

      • Cevilia (they/she/…)
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 month ago

        I know just enough to know that I absolutely shouldn’t try to roll my own encryption, and that’s enough knowledge for me

  • anton
    link
    fedilink
    arrow-up
    35
    ·
    1 month ago

    Hebrew-based content appears machine-translated

    Did they vibe code their false identity as well?

    • pivot_root@lemmy.world
      link
      fedilink
      arrow-up
      58
      ·
      1 month ago

      A hash is at least consistent when given identical inputs. What they created is more like a digital incinerator.

        • anton
          link
          fedilink
          arrow-up
          7
          ·
          1 month ago

          -u would give you the space back.
          The ransomware doesn’t. There is a block of data, sitting there, taunting you.

          • Jayjader@jlai.lu
            link
            fedilink
            arrow-up
            3
            ·
            1 month ago

            ehehehehe thanks for that mental image

            Of course, one can always reclaim that space if the data truly is inaccessible. Makes me want to write a joke program for “cleaning up” after ransomware that just removes the data from the partition table (or whatever the equivalent for files is - would that just be rm?)