Rival gang leaks decryption keys for Chimera ransomware

The authors of the Petya and Mischa ransomware programs leaked around 3,500 decryption keys for the Chimera ransomware

Aside from the efforts of security researchers and antivirus companies, malware victims can sometimes also benefit from the fighting between rival cybercriminal groups.

That happened this week when the creators of the Petya and Mischa ransomware programs leaked about 3,500 RSA private keys allegedly corresponding to systems infected with Chimera, another ransomware application.

In a post Tuesday on Pastebin, Mischa's developers claimed that earlier this year they got access to big parts of the development system used by Chimera's creators.

As a result of that hack, they obtained the source code for Chimera and integrated some of it into their own ransomware project, according to the Pastebin message.

This had already been confirmed by researchers from Malwarebytes, who reported last month that Mischa shares some components with Chimera.

There's no confirmation yet that the newly leaked RSA keys actually work to decrypt files affected by Chimera, but there's a big chance that they're legitimate.

"Checking if the keys are authentic and writing a decryptor will take some time – but if you are a victim of Chimera, please don’t delete your encrypted files, because there is a hope that soon you can get your data back," the Malwarebytes researchers said Tuesday in a blog post.

The Chimera ransomware program appeared in November and stood out because it threatened to leak users files on the internet in addition to encrypting them if they didn't pay up. There's no evidence its creators actually delivered on this threat and it was most likely intended as an intimidation tactic to increase the chance that victims will pay.

Mischa, on the other hand, is a newer threat. It first appeared in May and is typically bundled with another ransomware program, called Petya, that encrypts the master file table (MFT) of hard disk drives.

Since Petya's form of encryption requires admin access, Mischa is used as a backup when the needed privileges cannot be obtained. Mischa acts like most other ransomware programs, encrypting the victim's files directly.

Also on Tuesday, Petya and Mischa's creators launched an affiliate system, essentially turning their malware combo into ransomware as a service. This means other cybercriminals can now sign up to distribute these malicious programs for a portion of the profits.

"Unfortunately, this will most likely lead to a greater amount of distribution campaigns for this ransomware," said Lawrence Abrams, the founder of tech support forum BleepingComputer.com, in a blog post.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Cool Tech

Breitling Superocean Heritage Chronographe 44

Learn more >

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?