key|El_Cometa_leak_site|El_Cometa_leaked_keys_blog|El_Cometa_leaked_keys_files|El_Cometa_leaked_keys|SynACK-verified-decryption
key|El_Cometa_leak_site|El_Cometa_leaked_keys_blog|El_Cometa_leaked_keys_files|El_Cometa_leaked_keys|SynACK-verified-decryption

SynAck ransomware gang releases decryption keys for old victims

EXLCUSIVE – The El_Cometa ransomware gang, formerly known as SynAck, has released today master decryption keys for the victims they infected between July 2017 and early 2021.

The leaked keys were provided to The Record earlier today by an individual who identified themselves as a member of the former SynAck group.

2021-08-El_Cometa_leaked_keys_files.png

The keys have been verified as authentic by Michael Gillespie, a malware analyst at security firm Emsisoft and the creator of the ID-Ransomware service.

Gillespie told The Record he was able to use the leaked decryption utilities and private keys to decrypt files from old SynAck attacks.

2021-08-SynACK-verified-decryption.png

The Record will not be making these keys generally available as the decryption process can be somewhat complicated for non-technical users, and former SynAck victims who may try to decrypt older data might end up damaging files even further.

Instead, Gillespie said that Emsisoft would be developing its own decryption utility that will be safer and easier to use, which they will be releasing within the next few days.

Private keys released as group prepares to launch new RaaS

First spotted in July 2017, the SynAck gang is one of today's oldest ransomware groups still in operation.

While the group had a strong start with somewhat large distribution campaigns, the group also turned heads at the time because of some clever work on its encryption routines and the use of the process doppelgänging to evade antivirus detection, the first ransomware strain to do so.

However, as time passed, other ransomware operations grew larger. While the SynAck group continued to infect victims, its statistics were not in the same category as attacks carried out by larger operations like REvil, Netwalker, Ryuk, or BitPaymer.

In an interview today, the SynAck group said they've decided to release master decryption keys for old victims as they've now wound down the old SynAck operation and are focusing on a new one, which they launched last month and named El_Cometa.

2021-08-El_Cometa_leak_site.png

In addition, the group said that while they previously worked with only two outside "partners" on distributing SynAck, they now plan to considerably increase their operational model.

This will be done by launching a new Ransomware-as-a-Service (RaaS) platform, through which they plan to recruit more partners (also known as "affiliates") to carry out attacks and infect victims with the new El_Cometa strain.

SynAck now becomes the second ransomware group that released its decryption keys this summer after the Avaddon operation released theirs in June before shutting down.

Update on August 20: Emsisoft has released a decrypter for the SynAck ransomware, which is available for download here.

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.
No previous article
No new articles
Catalin Cimpanu

Catalin Cimpanu

is a cybersecurity reporter who previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement actions against hackers.