It's Proton ransomware
Edited by rivitna, 18 February 2024 - 07:18 AM.
Posted 18 February 2024 - 07:15 AM
Posted 18 February 2024 - 07:18 AM
Posted 18 February 2024 - 07:25 AM
To decrypt your files, you need the X25519 master private key :-(
Posted 18 February 2024 - 07:47 AM
@kingeope
I have merged your topic into the primary support topic for victims of this ransomware.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 18 February 2024 - 10:15 AM
To decrypt your files, you need the X25519 master private key :-(
The virus is active on the computer and can also encrypt new files. Doesn't it use the same key for encryption? Would it be possible to find it this way?
Thanks for your reply.
Posted 18 February 2024 - 11:08 AM
The ransomware contains only the master public key, and immediately encrypts and erases the session private key
Edited by rivitna, 18 February 2024 - 11:15 AM.
Posted 18 February 2024 - 01:59 PM
The ransomware contains only the master public key, and immediately encrypts and erases the session private key
And the private key is not on the computer? The device is encrypting without an internet connection. Shouldn't it use the same key again? Wouldn't it be possible to find this key with the debugger? Sorry to bother you with my questions, I'm just wondering if there is a possible solution.
Finally, is this encryption not decrypted in any way? Do you think there is a chance that it will be decrypted in the future? I had important data but I lost it, should I give up hope completely?
Thank you for your response.
Posted 18 February 2024 - 02:04 PM
Whether you can recover (decrypt) your files or not depends on what ransomware infection you are dealing with, the type and strength of encryption used by the malware writers and a variety of other factors as explained in Ransomware Encryption: The math, time and energy required to brute-force an encryption key (Post #16)
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 18 February 2024 - 02:36 PM
And the private key is not on the computer? The device is encrypting without an internet connection. Shouldn't it use the same key again? Wouldn't it be possible to find this key with the debugger? Sorry to bother you with my questions, I'm just wondering if there is a possible solution.
Finally, is this encryption not decrypted in any way? Do you think there is a chance that it will be decrypted in the future? I had important data but I lost it, should I give up hope completely?
For the first time, the ransomware generates a pair of session keys, it encrypts these session keys and writes them to the registry.
The ransomware also writes the session public key to the registry.
The next time the ransomware is launched, it will either use the public key from the registry, or generate a new pair.
Posted 20 February 2024 - 01:01 AM
Posted 20 February 2024 - 10:04 AM
i have the same problem and i paied to them and they told me they need to access the server again and after accessing it they told me they cant find the key as my windows was formated and i installed a new one but the data is tthere they told me to pay another money to generate the key manualy and after paying they stoped answering me and i need the data ergent is there is any solution
Posted 20 February 2024 - 10:05 AM
i have the same problem and i paied to them and they told me they need to access the server again and after accessing it they told me they cant find the key as my windows was formated and i installed a new one but the data is tthere they told me to pay another money to generate the key manualy and after paying they stoped answering me and i need the data ergent is there is any solution
Posted 20 February 2024 - 10:20 AM
Why would you trust the criminals who encrypted your data in the first place? Negotiating with the ransomware developers is not a good idea and in many cases the criminals have no intention of decrypting files after the ransom is paid. See my comments about victim experiences in Should you pay the ransom? (Post #17) in regards to paying the ransom (which is not advisable) or negotiating with the ransomware developers.
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
Posted 21 February 2024 - 03:11 AM
You can inform the contact address, so the other will know not to trust this variant, in case the victim decide to pay the ransom.
i have the same problem and i paied to them and they told me they need to access the server again and after accessing it they told me they cant find the key as my windows was formated and i installed a new one but the data is tthere they told me to pay another money to generate the key manualy and after paying they stoped answering me and i need the data ergent is there is any solution
Posted 21 February 2024 - 05:20 AM
0 members, 2 guests, 0 anonymous users