June 18, 2019 By David Bisson < 1 min read

An updated decryption tool enables victims of GandCrab ransomware version 5.2 and below to recover their affected files for free.

Bitdefender announced that users can download the decryption tool by visiting the No More Ransom Project, an initiative that seeks to connect crypto-ransomware victims with free decryptors. This utility arrived just a few weeks after the creators of GandCrab announced their retirement. As part of that transition, the malware authors vowed to delete all of the outstanding decryption keys, preventing victims from paying the ransom to recover their files going forward.

As reported by ZDNet, the individuals behind GandCrab said they’re retiring because they’ve “proven that by doing evil deeds, retribution does not come.” They said they made a total of $2 billion from their ransomware campaigns overall, having generated about $2.5 million every week from ransom payments alone.

Decryption Tool Puts a Dent in GandCrab’s Profits

According to Bitdefender, GandCrab’s authors likely exaggerated those numbers. The security firm noted that its GandCrab decryption tool, of which it had released three prior versions, had thwarted 30,000 successful infections and saved victims a total of $50 million at the time of this writing.

GandCrab is only the latest ransomware family for which security researchers have developed decryption tools. In May, Emsisoft released a decryptor for JSWorm 2.0. This was just a few weeks before the French Ministry of Interior unveiled a similar utility for PyLocky versions 1 and 2.

Mount a Layered Ransomware Defense

Beyond decryption tools, security teams can help defend their organizations against ransomware by integrating data backups, anti-malware solutions and other tools into a holistic, layered defense strategy. Security awareness training is also crucial to educate employees about common social engineering techniques attackers use to distribute ransomware and other threats.

More from

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today