Announcement

Collapse
No announcement yet.

help cracking 1024-bit malware key

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • help cracking 1024-bit malware key

    Wait, before you send this to /dev/null - This is an official request from Kaspersky Lab

    From the Crypto list:
    According to
    http://www.computerworld.com/action/...intsrc=hm_list
    some new malware is encrypting files with a 1024-bit RSA key. Victims
    are "asked" to pay a random to get their files decrypted. So -- can
    the key be factored?


    --Steve Bellovin, http://www.cs.columbia.edu/~sm

    so, anyone care to try?

    -mouse
    One Voter really can make a difference. Ask me how!

  • #2
    Re: help cracking 1024-bit malware key

    Originally posted by mouseling View Post
    Wait, before you send this to /dev/null - This is an official request from Kaspersky Lab

    From the Crypto list:

    ...and Steve Bellovin, no less.
    A laudable effort. Further information (found on the Full Disclosure list):

    From Dancho Danchev <dancho.danchev@gmail.com>

    The following is an OSINT analysis aiming to assist in tracking down
    the malware authors behind GPcode who seem be to be building custom
    decryptors, next to issuing a universal one which can be used to
    decrypt anything ever encrypted by them.

    Who's behind the GPcode ransomware? It's Russian teens with pimples,
    using E-gold and Liberty Reserve accounts, running three different
    GPcode campaigns, two of which request either $100 or $200 for the
    decryptor, and communicating from Chinese IPs. Here are all the
    details regarding the emails they use, the email responses they sent
    back, the currency accounts, as well their most recent IPs used in the
    communication.

    http://ddanchev.blogspot.com/2008/06...ansomware.html
    http://blogs.zdnet.com/security/?p=1259
    Thanks for bringing it up.

    Comment

    Working...
    X