uncloked-decrypt-encryption-lock|BlackByte-encryption-scheme|BlackByte

Free decrypter released for BlackByte ransomware victims

Cybersecurity firm Trustwave has released on Friday a free utility that victims of the BlackByte ransomware can use to decrypt and restore their files without paying the ransom demand.

Made available on GitHub, the decrypter exploits a design flaw in the ransomware's encryption routine.

In a two-part technical analysis, Trustwave researchers said they discovered that the BlackByte encryption routine began after the group downloaded a fake image file named "forest.png" on all of its victims' computers.

According to researchers, this file contained a "raw" cryptographic key that the ransomware would use to derive keys to encrypt the victim's files and then generate an access key to grant the victim access to a dark web portal where they could negotiate and pay the attacker's ransom.

2021-10-BlackByte-encryption-scheme.png

Image: Trustwave

Trustwave researchers said this process was rather simplistic compared to the more complex and more secure encryption routines used by other gangs.

The decrypter they released on Friday automates the process of reading the raw key from the forest.png file, and then computing the decryption key needed to recover and restore the victim's files.

A default "forest.png" file is included with the decrypter, but victims are advised to replace this file with the one found on their own systems.

BlackByte gang responds to researchers

The release of the decrypter did not go unnoticed by the ransomware gang. On Monday, the group posted a message on their dark web portal, trying to scare victims from using the decrypter.

Their response is valid and warns companies about using the decrypter with the wrong key (forest.png file), which would result in victims corrupting their files.

We would not recommend you to use that. because we do not use only 1 key. if you will use the wrong decryption for your system you may break everything, and you wont be able to restore your system again.we just want to warn you, if you do decide to use that, its at your own risk. 

BlackByte gang

2021-10-BlackByte.png

Image: The Record

But while the decrypter will help past victims, its release also means that the BlackByte gang also learned of the flaw in its encryption routine and will most likely fix it — something that has happened before with other decrypters released to the general public without taking down the ransomware gang's operations.

However, the fact that researchers found such a major flaw in the BlackByte ransomware encryption routine is not a surprise since this is a relatively new group, bound to have many bugs in its code.

First spotted three weeks ago, at the end of September, the gang has had limited activity and its dark web leak site, where the group lists victims who refused to pay the ransom demand, only lists eight entries so far.

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.
No previous article
No new articles
Catalin Cimpanu

Catalin Cimpanu

is a cybersecurity reporter who previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement actions against hackers.