BreachExchange mailing list archives
Ryuk Ransomware Decryptor Is Broken, Could Lead to Data Loss
From: Destry Winant <destry () riskbasedsecurity com>
Date: Thu, 12 Dec 2019 09:06:57 -0600
https://www.bleepingcomputer.com/news/security/ryuk-ransomware-decryptor-is-broken-could-lead-to-data-loss/ Due to recent changes in the Ryuk Ransomware encryption process, a bug in the decryptor could lead to data loss in large files. Ryuk is a ransomware infection known to target the enterprise or govt agencies by gaining access to their networks and then encrypting as many computers as possible. The attackers then demand large ransoms, sometimes in the millions, in order to receive a decryptor for their files. According to antivirus and security firm Emsisoft, Ryuk was recently modified so that it does not encrypt the entire file if it is larger than than 57,000,000 bytes or 54.4 megabytes. This is done to prevent the encryption process from taking too long, which could allow victims to more readily detect that the ransomware was running. Instead the decryptor will partially encrypt the file by encrypting a certain number of 1,000,000 byte blocks of data, up to a hard maximum of 2,000. You can see the formula Ryuk uses to compute the amount of blocks it will encrypt below. For a large file, the ransomware will then store the number of blocks that were encrypted next the 'HERMES' file marker in the footer. For example, the encrypted file below had 112 1 million-byte blocks encrypted. Smaller files that are entirely encrypted, though, will not contain a block count in the footer. Emsisoft CTO Fabian Wosar told BleepingComputer that a bug in the Ryuk decryptor is causing the size of the footer in large files to not be properly calculated due to the variable nature of the block count. This causes the decryptor to truncate certain files before the last byte. Why this is bad While many files do not contain data in the last byte of a file and it's mostly used as padding, some data files such as databases and virtual disk images do utilize the last byte. These types of files will therefore not load properly after being decrypted. "However, a lot of virtual disk type files like VHD/VHDX as well as a lot of database files like Oracle database files will store important information in that last byte and files damaged this way will fail to load properly after they are decrypted." To make matters worse, when the Ryuk decryptor thinks it correctly decrypted a file, it will delete the encrypted version. Since the decryptor thinks it is decrypting these large files correctly, even when it isn't, it will also decrypt the encrypted version. This make it harder to recover these files after running the decryptor. For those who are having issues with large files, Emsisoft offers a paid service where they will create a custom decryptor that does not contain this bug. Victims who need this assistance can request at ryukhelp () emsisoft com. Furthermore, all Ryuk victims should be sure to backup all of their encrypted data before performing any decryption, regardless of where you received the decryptor. This will protect your data in the event that a decryptor corrupts it. _______________________________________________ BreachExchange mailing list sponsored by Risk Based Security BreachExchange () lists riskbasedsecurity com If you wish to Edit your membership or Unsubscribe you can do so at the following link: https://lists.riskbasedsecurity.com/listinfo/breachexchange
Current thread:
- Ryuk Ransomware Decryptor Is Broken, Could Lead to Data Loss Destry Winant (Dec 12)