08-13-2021 , 07:10 AM
https://therecord.media/synack-ransomwar...d-victims/ Catalin Cimpanu August 12, 2021
SynAck ransomware gang releases decryption keys for old victims
EXLCUSIVE – The El_Cometa ransomware gang, formerly known as SynAck, has released today master decryption keys for the victims they infected between July 2017 and early 2021.
The leaked keys were provided to The Record earlier today by an individual who identified themselves as a member of the former SynAck group.
El_Cometa_leaked_keys_files
Image: The Record
The keys have been verified as authentic by Michael Gillespie, a malware analyst at security firm Emsisoft and the creator of the ID-Ransomware service.
Gillespie told The Record he was able to use the leaked decryption utilities and private keys to decrypt files from old SynAck attacks.
SynACK-verified-decryption
Image: The Record
The Record will not be making these keys generally available as the decryption process can be somewhat complicated for non-technical users, and former SynAck victims who may try to decrypt older data might end up damaging files even further.
Instead, Gillespie said that Emsisoft would be developing its own decryption utility that will be safer and easier to use, which they will be releasing within the next few days.
Private keys released as group prepares to launch new RaaS
First spotted in July 2017, the SynAck gang is one of today’s oldest ransomware groups still in operation.
While the group had a strong start with somewhat large distribution campaigns, the group also turned heads at the time because of some clever work on its encryption routines and the use of the process doppelgänging to evade antivirus detection, the first ransomware strain to do so.
However, as time passed, other ransomware operations grew larger. While the SynAck group continued to infect victims, its statistics were not in the same category as attacks carried out by larger operations like REvil, Netwalker, Ryuk, or BitPaymer.
In an interview today, the SynAck group said they’ve decided to release master decryption keys for old victims as they’ve now wound down the old SynAck operation and are focusing on a new one, which they launched last month and named El_Cometa.
El_Cometa_leak_site
Image: The Record
In addition, the group said that while they previously worked with only two outside “partners” on distributing SynAck, they now plan to considerably increase their operational model.
This will be done by launching a new Ransomware-as-a-Service (RaaS) platform, through which they plan to recruit more partners (also known as “affiliates”) to carry out attacks and infect victims with the new El_Cometa strain.
SynAck now becomes the second ransomware group that released its decryption keys this summer after the Avaddon operation released theirs in June before shutting down. Catalin Cimpanu is a cybersecurity reporter for The Record. He previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement actions against hackers.
SynAck ransomware gang releases decryption keys for old victims
EXLCUSIVE – The El_Cometa ransomware gang, formerly known as SynAck, has released today master decryption keys for the victims they infected between July 2017 and early 2021.
The leaked keys were provided to The Record earlier today by an individual who identified themselves as a member of the former SynAck group.
El_Cometa_leaked_keys_files
Image: The Record
The keys have been verified as authentic by Michael Gillespie, a malware analyst at security firm Emsisoft and the creator of the ID-Ransomware service.
Gillespie told The Record he was able to use the leaked decryption utilities and private keys to decrypt files from old SynAck attacks.
SynACK-verified-decryption
Image: The Record
The Record will not be making these keys generally available as the decryption process can be somewhat complicated for non-technical users, and former SynAck victims who may try to decrypt older data might end up damaging files even further.
Instead, Gillespie said that Emsisoft would be developing its own decryption utility that will be safer and easier to use, which they will be releasing within the next few days.
Private keys released as group prepares to launch new RaaS
First spotted in July 2017, the SynAck gang is one of today’s oldest ransomware groups still in operation.
While the group had a strong start with somewhat large distribution campaigns, the group also turned heads at the time because of some clever work on its encryption routines and the use of the process doppelgänging to evade antivirus detection, the first ransomware strain to do so.
However, as time passed, other ransomware operations grew larger. While the SynAck group continued to infect victims, its statistics were not in the same category as attacks carried out by larger operations like REvil, Netwalker, Ryuk, or BitPaymer.
In an interview today, the SynAck group said they’ve decided to release master decryption keys for old victims as they’ve now wound down the old SynAck operation and are focusing on a new one, which they launched last month and named El_Cometa.
El_Cometa_leak_site
Image: The Record
In addition, the group said that while they previously worked with only two outside “partners” on distributing SynAck, they now plan to considerably increase their operational model.
This will be done by launching a new Ransomware-as-a-Service (RaaS) platform, through which they plan to recruit more partners (also known as “affiliates”) to carry out attacks and infect victims with the new El_Cometa strain.
SynAck now becomes the second ransomware group that released its decryption keys this summer after the Avaddon operation released theirs in June before shutting down. Catalin Cimpanu is a cybersecurity reporter for The Record. He previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement actions against hackers.