{"id":5479,"date":"2021-10-27T14:47:36","date_gmt":"2021-10-27T05:47:36","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=5479"},"modified":"2021-12-06T14:50:12","modified_gmt":"2021-12-06T05:50:12","slug":"avast-releases-free-atomsilo-and-lockfile-ransomware-decryptor-based-on-weakness-in-atomsilo-ransomware","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/avast-releases-free-atomsilo-and-lockfile-ransomware-decryptor-based-on-weakness-in-atomsilo-ransomware\/","title":{"rendered":"Avast releases free AtomSilo and LockFile ransomware decryptor based on weakness in AtomSilo ransomware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5479\" class=\"elementor elementor-5479\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1278215 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1278215\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b71ea77\" data-id=\"b71ea77\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5db433f elementor-widget elementor-widget-text-editor\" data-id=\"5db433f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Wednesday 27th of October 2021, Avast, a Czech cybersecurity software firm announced that they had released a free decryption tool for AtomSilo and LockFile ransomware victims based on a weakness in the AtomSilo ransomware that found by RE &#8211; CERT malware analyst Ji\u0159\u00ed Vinopal. The decryptor is valid for both kinds of ransomware strains as they are very similar even though the attack tactics used by the different threat actors are different.<\/p><p>Avast has warned that a decryptor may not be able to decrypt files with unknown, proprietary, or with no format at all as it \u201crelies on a known file format to verify that the file was successfully decrypted. For that reason, some files may not be decrypted,&#8221;<\/p><p>The decryption tool is available for download from Avast&#8217;s servers and can decrypt entire disk partitions using the instructions displayed within the decryptor&#8217;s UI.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Wednesday 27th of October 2021, Avast, a Czech cybersecurity software firm announced that they had released a free decryption tool for AtomSilo and LockFile ransomware victims based on a weakness in the AtomSilo ransomware that found by RE &#8211; CERT malware analyst Ji\u0159\u00ed Vinopal. The decryptor is valid for both kinds of ransomware strains as they are very similar<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":5484,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,10,12,9,2],"tags":[],"class_list":["post-5479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-latest_vulnerabilities","category-read_article","category-ransomware_criminals","category-ce_news"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/12\/Picture3.jpg?fit=1377%2C900&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/5479"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=5479"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/5479\/revisions"}],"predecessor-version":[{"id":5487,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/5479\/revisions\/5487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/5484"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=5479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=5479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=5479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}