Tuesday, July 26, 2016

Feedly:Understanding Java Code and Malware | Malwarebytes Unpacked. Keys to Chimera ransomware leaked

from Understanding Java Code and Malware | Malwarebytes Unpacked

When ransomware authors compete on the black market, sometimes victims benefit. This time we got access to private keys of the Chimera ransomware. They have been leaked online and shared by another cybercriminal – known for being the author of Petya.

The person under the handle JanusSecretary, made a public announcement on Twitter today:


In the linked message, he admits using parts of the Chimera sourcecode in his Mischa ransomware:


However, as we can conclude from his message, he is not its author but rather a Chimera team’s competitor. That’s why he decided to share the private keys of their product, allowing some of the victims to recover their encrypted files. You can find the mirror of the dump here.

Checking if the keys are authentic and writing a decryptor will take some time – but if you are a victim of Chimera, please don’t delete your encrypted files, because there is a hope that soon you can get your data back.


Inside Chimera Ransomware – the first ‘doxingware’ in wild


April 30, 2012 - Malwarebytes Anti-Malware is under constant attack. 24 hours per day, 7 days per week, 365 days per year. If you read my recent blog post about the development of Malwarebytes Chameleon, you know that we at Malwarebytes have big red ‘X’s on our chests; the bad guys are always out to get us. Malwarebytes Anti-Malware...

April 24, 2012 - The fight against malware is a cat-and-mouse game. It is constant and constantly escalating. They make a move, you counter it, they counter your counter, lather, rinse, repeat. What’s more: malware almost always has the advantage. Our software Malwarebytes Anti-Malware earned a reputation for having a high success rate in combating new in-the-wild malware infections:...

May 7, 2012 - From the outside looking in, it may appear that the press regularly reports stories when a company’s website, database or intellectual property has been hacked, stolen or compromised. The more eye-opening fact of the matter is that the scale and scope of the cybercrime problem is much, much larger and the actual incidences of these...

May 14, 2012 - The recent attack on the Serious Organized Crime Agency (SOCA), most likely in response to the 36 data selling sites shut down a few weeks ago, lead to the admission by high ranking SOCA officials that the Ministry of Defense networks need to “beef up their security.”  In response to this we would like to...

June 1, 2012 - The last time I checked with Google News this morning there were over 19,100,000 results for “flame malware”.  You may have heard many stories this week about this complex trojan. Here are links to three of my current personal favorite articles on “Flame”. Powerful ‘Flame’ cyberweapon tied to popular Angry Birds game – (Fox News)...

Web Analytics