I recently helped a company recover their data from the Akira ransomware without paying the ransom. I'm sharing how I did it, along with the full source code.
The code is here: https://github.com/yohanes/akira-bruteforce
To clarify, multiple ransomware variants have been named Akira over the y
Maybe for performance so as to decrease the chances of detection
Edit: sorry disregard my comment, I read that as “symmetric”.
In the case of asymmetric they can only deploy one part of the key which if intercepted cannot be used to decrypt.
I wonder why they used an assymetric algo.
Maybe for performance so as to decrease the chances of detection
Edit: sorry disregard my comment, I read that as “symmetric”. In the case of asymmetric they can only deploy one part of the key which if intercepted cannot be used to decrypt.
Yeah that makes sense, I figured they’d just spin up a symmetric key, use it, send it home and delete it locally.
Can someone elaborate? I’m not as informed…
Check my comment to flyswat.