Cisco Talos releases PyLocky ransomware decryptor - but there's a catch
FYI, this story is more than a year old
Security firm Cisco Talos has released a free decryption tool for Windows users affected by the PyLocky ransomware – but it won’t work for everyone.
PyLocky is an imitation of the notorious ‘Locky’ ransomware, except it is written in a programming language called Python. The ransomware tries to mimic other ransomware families. While ransomware is a menace to those who happen to be infected by it, decryption tools can often reverse the damage. In PyLocky’s case Cisco Talos managed to create a decryption tool, but there’s a very big catch.
The tool will only work for those who managed to capture a PCAP of the outbound connection attempt to the ransomware’s command & control servers – a connection that happens mere seconds after the infection. In a nutshell, the PyLocky ransomware decryptor will only work on machines that have network traffic monitoring capabilities.
According to Cisco Talos, PyLocky generates a random user ID and password when it executes. It also gathers information about the infected machine by using WMI wrappers.
"After obtaining the absolute path of every file on the system, the malware then calls the encryption algorithm, passing it the IV and password.”
Each file is first base64-encoded before it is encrypted. The malware appends the extension ".lockedfile" to each file it encrypts - for example, the file "picture.jpg" would become "picture.jpg.lockedfile."
Each file is then overwritten with a ransom demand.
For those victims who do use network monitoring software, they just need to download the decryptor to their infected machine, download WinPcap, specify the PCAP file with IV and password, and wait for the decryptor to do its thing. The company says that during its testing phase, the decryptor was able to recover three infected systems, however very large files 4GB and over may not be able to be decrypted.
The company says the decryptor is built for use on Windows systems and takes no responsibility for misuse of the decryptor tool.
“Talos encourages users never to pay an attacker-demanded ransom, as this rarely results in the recovery of encrypted files. Rather, victims of this ransomware should restore from backups if their files cannot be decrypted. Just as in the June 2017 Nyetya attack, Talos has observed on numerous occasions that attackers who are demanding ransoms may have no way to communicate with victims to provide a decryptor,” says Cisco Talos.