{"id":6988,"date":"2022-07-07T03:11:22","date_gmt":"2022-07-06T18:11:22","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=6988"},"modified":"2022-08-09T03:13:30","modified_gmt":"2022-08-08T18:13:30","slug":"emsisoft-releases-free-astralocker-and-yashma-ransomware-decryptor","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/emsisoft-releases-free-astralocker-and-yashma-ransomware-decryptor\/","title":{"rendered":"Emsisoft releases free AstraLocker and Yashma ransomware decryptor"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6988\" class=\"elementor elementor-6988\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35f932c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35f932c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d726bf1\" data-id=\"d726bf1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2517f58 elementor-widget elementor-widget-text-editor\" data-id=\"2517f58\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Thursday 7th of July 2022, Emsisoft, a New Zealand-based cybersecurity firm announced that they had released a free decryption tool for AstraLocker and Yashma ransomware which is available for download from Emsisoft\u2019s servers. The decryption tool is based on AstraLocker\u2019s Babuk-based decryptor and Yashma\u2019s Chaos-based decryptor.<\/p><p>Emsisoft has warned the victims of these ransomware variants to quarantine the malware before attempting to use the tool to ensure that the ransomware doesn\u2019t repeatedly encrypt their systems. The decryptor works by pre-populating the locations to decrypt with the currently connected drives and network drives. It also has a failsafe function to ensure that the encrypted files are not lost or corrupted after attempting to use the tool to decrypt the files.<\/p><p>Emsisoft also advised the victims to change all passwords for all user accounts that have permissions to log in remotely and to check for any new added local accounts which may have been added by the ransomware gangs.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Thursday 7th of July 2022, Emsisoft, a New Zealand-based cybersecurity firm announced that they had released a free decryption tool for AstraLocker and Yashma ransomware which is available for download from Emsisoft\u2019s servers. The decryption tool is based on AstraLocker\u2019s Babuk-based decryptor and Yashma\u2019s Chaos-based decryptor. Emsisoft has warned the victims of these ransomware variants to quarantine the malware<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":6993,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,10,12,9,2,1],"tags":[],"class_list":["post-6988","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-latest_vulnerabilities","category-read_article","category-ransomware_criminals","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2022\/08\/cyenso16.jpg?fit=1377%2C918&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6988"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=6988"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6988\/revisions"}],"predecessor-version":[{"id":6996,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6988\/revisions\/6996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/6993"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=6988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=6988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=6988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}