Gamma ransomware successful decryption processing Tianyi Decryption Method tutorial mailbox catherwood.judd@aol.com

Source: Internet
Author: User
Recently, Tianyi decryption security team found that gandcrab4.0 was more active and has tracked many gandcrab4.0 variant ransomware events. A security warning has been issued to remind users to prevent gandcrab4.0 ransomware.

Currently, Tianyi decryption can successfully decrypt the gandcrab4.0 variant using the RSA + AES encryption algorithm Krab poisoning file within one hour.
Phone 15169121444 QQ 3157331512

Case study:
On September 6, October 1, 2018, I received a message from a gas company in Tangshan, and called Fudan to decrypt our company. I was told by a Sangfor manufacturer that
To solve these problems in the industry, we sent engineers to the site in two hours and analyzed that this is the fourth generation of ransomware encryption, which can be fully handled. Restoring and deleting files is futile. We directly use the encryption tool of the encryption software to perform on-site decryption. Each server takes two hours to complete the repair of 6 servers. The customer is very happy to pay attention to security defense and disaster tolerance backup. The customer asked us to submit security suggestions and help them back up a set of backups, the subsequent backup scheme and implementation work with the company.

The gandcrab4.0 variant uses the RSA + AES encryption algorithm to encrypt most file files in the system with the. Krab suffix, and then blackmailed users. The ransomware is spread through RDP brute-force attacks, emails, vulnerabilities, spam websites, and Trojans. The ransomware itself does not have the ability to spread infections and will not initiate other devices on the LAN ***, encrypts the files in the shared directory on the LAN.

Emergency Treatment Plan

1. for servers that have been recruited
Offline isolation.
2. for servers not recruited
1) Globally disable port 3389 or port 3389 on the network border firewall, which is only open to specific IP addresses.
2) Enable the Windows Firewall and close as many high-risk ports as possible, such as 3389, 445, 139, and 135.
3) set a unique password for each server. The complexity must be a combination of uppercase and lowercase letters, numbers, and special characters. The password length must be 15 characters long enough ).

Gamma ransomware, decryption, processing, Tianyi Decryption Method tutorial email [email protected]

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.