Story image

Cisco Talos releases PyLocky ransomware decryptor - but there's a catch

14 Jan 2019

Security firm Cisco Talos has released a free decryption tool for Windows users affected by the PyLocky ransomware – but it won’t work for everyone.

PyLocky is an imitation of the notorious ‘Locky’ ransomware, except it is written in a programming language called Python. The ransomware tries to mimic other ransomware families. While ransomware is a menace to those who happen to be infected by it, decryption tools can often reverse the damage. In PyLocky’s case Cisco Talos managed to create a decryption tool, but there’s a very big catch.

The tool will only work for those who managed to capture a PCAP of the outbound connection attempt to the ransomware’s command & control servers – a connection that happens mere seconds after the infection. In a nutshell, the PyLocky ransomware decryptor will only work on machines that have network traffic monitoring capabilities.

According to Cisco Talos, PyLocky generates a random user ID and password when it executes. It also gathers information about the infected machine by using WMI wrappers.

"After obtaining the absolute path of every file on the system, the malware then calls the encryption algorithm, passing it the IV and password.”

Each file is first base64-encoded before it is encrypted. The malware appends the extension ".lockedfile" to each file it encrypts - for example, the file "picture.jpg" would become "picture.jpg.lockedfile." 

Each file is then overwritten with a ransom demand.

For those victims who do use network monitoring software, they just need to download the decryptor to their infected machine, download WinPcap, specify the PCAP file with IV and password, and wait for the decryptor to do its thing. The company says that during its testing phase, the decryptor was able to recover three infected systems, however very large files 4GB and over may not be able to be decrypted.

The company says the decryptor is built for use on Windows systems and takes no responsibility for misuse of the decryptor tool.

“Talos encourages users never to pay an attacker-demanded ransom, as this rarely results in the recovery of encrypted files. Rather, victims of this ransomware should restore from backups if their files cannot be decrypted. Just as in the June 2017 Nyetya attack, Talos has observed on numerous occasions that attackers who are demanding ransoms may have no way to communicate with victims to provide a decryptor,” says Cisco Talos.  

Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
SAS announces US$1 billion investment in AI
"At SAS, we remain dedicated to our customers and their success, and this investment is another example of that commitment."
Two Ministers’ thoughts on blockchain in Oz
Minister Karen Andrews, and Minister Simon Birmingham have released a joint statement on the national blockchain roadmap and extra $100,000 funding.
IntegrationWorks continues expansion with new Brisbane office
The company’s new office space at the Riverside Centre overlooks the Brisbane River and Storey Bridge.
DXC subsidiary takes SAP energy industry partner award
Winners of the awards were selected from SAP’s A/NZpartner ecosystem and announced at the recent SAP A/NZ Partner Kick-Off Meeting held in Sydney.
NetApp and allegro.ai showcase an integrated solution for deep learning
Unlike traditional software, in deep learning, the data rather than the code is of the utmost importance.
Opinion: Moving applications between cloud and data centre
OpsRamp's Bhanu Singh discusses the process of moving legacy systems and applications to the cloud, as well as pitfalls to avoid.
Workflows should benefit people, not devices
It is important that, in digital transformation journeys, managers remember technology should complement, rather than overtake, employee talent and skillsets.