Summary: Yohanes Nugroho has created a decryptor for the Linux version of Akira ransomware, utilizing GPU power to unlock encrypted files without a traditional key. The development took three weeks and significant resources, but he successfully brute-forced the encryption keys based on the ransomware’s unique timestamp-based key generation. The tool is now available on GitHub, accompanied by recovery instructions.
Affected: Akira ransomware victims
Keypoints :
- Decryptor leverages GPU computing power to retrieve unique encryption keys for affected files.
- Nugroho initially underestimated the project’s complexity, spending ,200 and employing cloud GPU services.
- Precise timestamp utilization in generating keys makes brute-forcing challenging but feasible with the right approach.
- Users are advised to back up original files before attempting decryption, as incorrect keys may cause data corruption.