Thursday 14 April 2016

Finally Petya Ransomware Has Fixed And No Need To Pay Ransom

Petya Ransomware Has Fixed And No Need To Pay Ransom

Finally Petya Ransomware Has Fixed And No Need To Pay Ransom.

At the last month there is a new variety of ransomware exploded into the scene as well as becomes vulnerable not only just files but also hard drives. Calling itself “Petya” , the ransomware encrypted as well as targeted the whole hard drives in spite of single files.

Not so many the threat was increasing but it only obtained a week or two for the community of security to come up with a solution. Even though the process is slightly involved but the good news is that you would not have to pay only a single cent. At least it would not pay to the malware authors or its users.


In these days Petya is different from the other popular ransomware. Instead of the encrypting files one by one and it refuses the accessing power to the full system by attacking the low-level structures on the disk. This author of ransomware that have not only created their own boot loader but also a tiny kernel, which has 32 sectors long.

The dropper of Petya that writes the malicious code at the beginning of the disk. The affected system is known as MBR(master boot record) which is overwritten by the conventional boot loader that loads a tiny malicious kernel. Then, this kernel profits with further encryption. The ransom note of Petya states that it encrypts the full disk, but this is not true. Instead of it can encrypt the master file table (MFT) that’s why the file system is not readable.

The latest threat to rock the scene of malware is known as Ransomware and now it is getting more extensive, more unabashed as well as consequently it becomes more dangerous. Perhaps while TeslaCrypt 3 left the one malware with the most probability for damage up to longterm. Even the Petya ransomware is no less effective. By making the target of the entire drives which remains the users in a very little twist room to crack to improve the whole drive without paying the ransom. At least until now.

Even the results declare in two parts as well as from the two different people. Whereas the original algorithm that produces the decryption password that was designed by a Twitter user who goes by "lost one". In a real meaning that you just simply paste a long thread of characters that produced from the affected hard disk into a web page and then it would wait for the password that will release the hard disk. And that process can take only a few seconds.

The tough part is that the nonetheless it is getting the long sequence of characters in the first place. If it is done manually then it will occupy an almost mysterious process that only become the finest of computer wizards that will be familiar to.

Fortunately, Fabian Wosar who created a special kind of tool that makes routine of the almost all of that for you. Even infected users that will require performing a few manual tasks which boil down to taking out the affected hard drive and then plugging it into a PC with a clean, working Windows system. For a standard layman, that unaccompanied might be frightening. But for the recover important files and data, that might very well be worth the sweat.

And while neither it has the charging for their tools nor least one does have a donate button on his web page. Just in case you are feeling obliged for not having to pay ten times what you would be donating instead.


Post a Comment

Note: only a member of this blog may post a comment.

Toggle Footer