{"id":6380,"date":"2022-02-09T17:46:15","date_gmt":"2022-02-09T08:46:15","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=6380"},"modified":"2022-03-30T17:48:18","modified_gmt":"2022-03-30T08:48:18","slug":"egregor-maze-master-decryption-keys-released-by-alleged-developer","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/egregor-maze-master-decryption-keys-released-by-alleged-developer\/","title":{"rendered":"Egregor, Maze master decryption keys released by alleged developer"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6380\" class=\"elementor elementor-6380\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7eedd82 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7eedd82\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aea1d1f\" data-id=\"aea1d1f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c9c975 elementor-widget elementor-widget-text-editor\" data-id=\"7c9c975\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Tuesday 8<sup>th<\/sup> of February 2022, the decryption keys for Maze, Egregor, and Sekhmet ransomware operations and the source code for the M0yv &#8216;modular x86\/x64 file infector&#8217; were leaked on the BleepingComputer forums by the alleged malware developer who went by the name of \u201cTopleak\u201d when leaking the keys. The user stated that this leak was planned and had no connections to the recent law enforcement operations against ransomware affiliates.<\/p><p>&#8220;Since it will raise too much clues and most of them will be false, it is necessary to emphasize that it is planned leak, and have no any connections to recent arrests and takedowns&#8221; \u2013 \u201cTopleak\u201d<\/p><p>The decryption keys have been reviewed by cyber professionals from Emsisoft and have claimed as legitimate keys which can be used to decrypt files that have been encrypted by one of these ransomware variants. Since the leak, Emsisoft has released a decryptor which uses these keys to decrypt any Maze, Egregor, and Sekhmet victims\u2019 files for free. The alleged developer also stated that none of their team members will ever return to ransomware and that they destroyed all the source code for their ransomware.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Tuesday 8th of February 2022, the decryption keys for Maze, Egregor, and Sekhmet ransomware operations and the source code for the M0yv &#8216;modular x86\/x64 file infector&#8217; were leaked on the BleepingComputer forums by the alleged malware developer who went by the name of \u201cTopleak\u201d when leaking the keys. The user stated that this leak was planned and had no<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":6385,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,12,2,1],"tags":[],"class_list":["post-6380","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-read_article","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2022\/03\/Picture1-7.jpg?fit=1377%2C919&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6380"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=6380"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6380\/revisions"}],"predecessor-version":[{"id":6388,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6380\/revisions\/6388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/6385"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=6380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=6380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=6380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}