RateLimited°C
11-05-2024
BSV
$46.48
Vol 18.07m
-0.48%
BTC
$68748
Vol 46061.55m
-0.27%
BCH
$338.71
Vol 269.87m
-0.15%
LTC
$65.48
Vol 348.41m
-2%
DOGE
$0.16
Vol 3753.8m
7.47%
Getting your Trinity Audio player ready...

Emsisoft has released a free decryption tool for the BTC-demanding ransomware WannaCryFake. In a blog post announcing the tool, the cybersecurity company assured its users that it will help them recover their files without the risk of permanent data loss.

WannaCryFake is a variant of the WannaCry ransomware that terrorized Windows users in 2017. To encrypt a victim’s files, it uses AES-256 encryption. Once the ransomware infects a host computer, the attackers send a note informing the owner that their files have been encrypted.

Part of the note states, “All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail [email protected].”

It then goes on to demand that the victim pays the attackers in BTC in order for the files to be decrypted. The size of the ransom depends on how fast you email them. The attackers even offer to decrypt up to five files for the victims for free as guarantee.

The attackers also include some instructions on how the victim can buy BTC, including a link to LocalBitcoins and another link to an article on how to buy BTC.

As with all the other ransomware attacks, the ransom note includes an explicit warning against attempting to decrypt the files. “Do not try to decrypt your data using third party software, it may cause permanent data loss,” the note warns.

However, Emsisoft has urged the victims not to reach out to the attackers.

“Regardless of what the ransom note might say, our decryption tool can help you recover your files for free and will not cause permanent data loss. Please get in touch with our support team if you have any questions.”

WannaCry ransomware broke out in May 2017, attacking computers running Microsoft Windows globally. The malware encrypted the victim’s data and demanded ransom in BTC. WannaCry propagated through EternalBlue, an exploit developed by the NSA which was stolen and leaked by a group of hackers known as The Shadow Brokers. The malware infected government systems, hospitals, railway networks, multinational companies and more in just a few hours.

Recommended for you

How to construct transactions on BSV blockchain with Python
Python coders, it's time to start learning how to build Bitcoin transactions as nChain's Senior Software Engineer, Arthur Gordon, recently...
November 5, 2024
BSV Association joins OnlyDust’s developer event sponsor list
OnlyDust is a network for open-source developers working with blockchain and decentralized projects; its purpose is to connect contributors, maintainers,...
October 23, 2024
Advertisement
Advertisement
Advertisement