The developer of HildaCrypt has released the master decryption keys that would allow potential victims of the ransomware to recover their data for free.
— Cyber Security (@GrujaRS) October 4, 2019
The developer of the threat saw GrujaRS’s post and contacted the researcher to inform them that their analysis was incorrect. They clarified that the ransomware was not a STOP variant but instead a sample of a new ransomware family called “HildaCrypt.” As part of this clarification, the developer decided to hand over the threat’s master decryption keys.
GrujaRS passed along those keys to Michael Gillespie, founder of ID Ransomware. Gillespie used the keys to create a decryption utility that all victims of HildaCrypt can now use to recover their affected files for free. That tool is available here.
In the meantime, the developer had a chat with Bleeping Computer about HildaCrypt. They told the computer self help site that they had created the ransomware mainly to satisfy their curiosity and that “it was mainly an educational thing really.” After stating that “hildacrypt never was used on anyone,” the developer said they’d probably stop working on the ransomware and instead start focusing their efforts on work within the digital security community.
This isn’t the first time that someone has created ransomware for educational purposes. Back in 2015, a Turkish programmer known as Utku Sen created a proof-of-concept (POC) for a crypto-malware family known as “Hidden Tear” and made the code public on their website. Sen said that they created Hidden Tear so that (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/decryption-keys-released-by-developer-of-hildacrypt-ransomware/