Earlier this month Kaspersky was first to identify a new and improved variant of the blackmailing Gpcode trojan.
The virus works by infiltrating a user’s computer via unpatched browsers. Once active it encodes most of the data on the computer, including .doc, .txt, .pdf, .xls, .jpg and .png files, with a 1024 bit key and then demands money from the user to obtain the decryption key.
The malware is a revision of a previous virus, thought to be from the same author, which appeared two years ago but only used a 660 bit key.
Although Kaspersky and other security vendors have been successful in cracking the 660 bit key, efforts to decode the 1024 bit key have proven unsuccessful.
And while Kaspersky is still yet to crack the 1024 bit encryption, it has identified a method to retrieve users’ encrypted files.
The new method makes use of the fact that before encrypting a file, the Gpcode ransomware creates a new file ‘next to’ the file it encrypts. Once encryption of a file is complete, the virus deletes the original file.
Kaspersky has pinpointed a method based on data recovery techniques to retrieve the original file.
To do this, Kaspersky Lab analysts have leveraged the free PhotoRec utility while adding the ability to restore exact file names and pathways.
The downloadable executable "restores original filenames and the full paths of the files recovered," said Kaspersky.
While the new utility is free, Kaspersky is asking victims to consider donating to the PhotoRec creators, who include Christophe Grenier.
Kaspersky pinpoints workaround for ransomware virus
By
Mitchell Bingemann
on Jun 17, 2008 3:13PM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
Ingram Micro Ushers in the Age of Ultra

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

Channel can help lead customers to boosting workplace wellbeing with professional headsets

Kaseya Dattocon APAC 2024 is Back
Sponsored Whitepapers

Easing the burden of Microsoft CSP management
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management