Get the latest tech news
Decrypting Encrypted files from Akira Ransomware using a bunch of GPUs
I recently helped a company recover their data from the Akira ransomware without paying the ransom. I'm sharing how I did it, along with the full source code. The code is here: https://github.com/yohanes/akira-bruteforce To clarify, multiple ransomware variants have been named Akira over the y
The malware uses multiple threads, It runs on a machine that is not idle, the distance between T3 and T4 varies based on the scheduler and how busy the system at that time. in VMFS, accuracy is secondThe malware uses multithreading, where each file is processed in a new thread, with a pool of workers limited by the number of CPU cores. It turned out that the malware included a slight modification in the initialization vector and the encryption process, specifically involving endian swapping.
Or read this on Hacker News