Heimdal
article featured image

Contents:

Another good news in the world of ransomware attacks! Czech multinational cybersecurity software organization Avast has recently developed and published a decryptor that will help those affected by AtomSilo and LockFile ransomware attacks get back some of the encrypted files for free.

BleepingComputer announced yesterday that Avast also released a free decryption tool for the victims of Babuk ransomware.

According to the antivirus software company, this decryptor may be unable to decrypt files in unknown, proprietary, or non-existent formats.

During the decryption process, the Avast AtomSilo decryptor relies on a known file format in order to verify that the file was successfully decrypted. For that reason, some files may not be decrypted.

Source

Even though the gangs that deliver the ransomware on victims’ systems employ distinct attack strategies, the decryption tool can be used for both ransomware types as they are very similar.

According to Avast Threat Labs, this decryption tool was developed together with RE – CERT malware researcher Ji Vinopal, who has recently discovered a flaw in the AtomSilo ransomware strain.

As explained by BleepingComputer, entities impacted by AtomSilo and LockFile can download the decryptor from Avast’s servers and decrypt entire disk partitions by following the steps shown in the decryptor’s user interface.

Using Avast’s free decryptor, the tech news publication tested the recently released tool and got back the files encrypted with an AtomSilo sample.

Source

Earlier this year, we were writing about a new malware that started to target Microsoft Exchange servers, performing Windows domains encryption. The LockFile ransomware abused ProxyShell and PetitPotam vulnerabilities.

As explained by BleepingComputer, the LockFile ransomware will add the.lockfile extension to the names of encrypted files and drop ransom messages in the ‘[victim name]-LOCKFILE-README.hta’ format when encrypting them.

At the beginning of the month, we saw that AtomSilo started targeting confluence serversSophosLabs researchers made the discovery while analyzing a recent event. They also found that the ransomware employed by this new organization is nearly comparable to LockFile, which is extremely similar to the LockBit malware.

Operators of the AtomSilo, on the other hand, employ “a number of innovative tactics that make it exceedingly difficult to examine, including the side-loading of malicious dynamic-link libraries designed to disrupt endpoint security software.”

If you liked this article, follow us on LinkedInTwitterFacebookYoutube, and Instagram for more cybersecurity news and topics.

Author Profile

Antonia Din

PR & Video Content Manager

linkedin icon

As a Senior Content Writer and Video Content Creator specializing in cybersecurity, I leverage digital media to unravel and clarify complex cybersecurity concepts and emerging trends. With my extensive knowledge in the field, I create content that engages a diverse audience, from cybersecurity novices to experienced experts. My approach is to create a nexus of understanding, taking technical security topics and transforming them into accessible, relatable knowledge for anyone interested in strengthening their security posture.

Leave a Reply

Your email address will not be published. Required fields are marked *

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE