{"id":38,"date":"2020-05-30T12:40:58","date_gmt":"2020-05-30T12:40:58","guid":{"rendered":"https:\/\/www.solutionsunlimitedsc.com\/blog\/?p=38"},"modified":"2020-11-06T13:33:26","modified_gmt":"2020-11-06T13:33:26","slug":"shade-ransomware-gang-gives-up-keys-apologizes-to-victims","status":"publish","type":"post","link":"https:\/\/www.solutionsunlimitedsc.com\/blog\/shade-ransomware-gang-gives-up-keys-apologizes-to-victims\/","title":{"rendered":"Shade ransomware gang gives up keys, apologizes to victims"},"content":{"rendered":"<p>The malicious actors behind Shade ransomware made an unusual announcement on GitHub, not only publishing all 750,000 decryptor keys for the malware but apologizing for their criminal actions.<\/p>\n<p>\u201cWe are the team which created a trojan-encryptor mostly known as Shade, Troldesh or Encoder.858. In fact, we stopped its distribution in the end of 2019.\u201d the operators purportedly\u00a0<a href=\"https:\/\/github.com\/shade-team\/keys\">posted<\/a>. \u201cAll other data related to our activity (including the source codes of the trojan) was irrevocably destroyed. We apologize to all the victims of the trojan and hope that the keys we published will help them to recover their data.\u201d<\/p>\n<p>Each key decryptor likely represents one attack making Shade particularly virulent during its time. The group gave no reason for its sudden change of heart and Shahrokh Shahidzadeh, CEO at Acceptto, said the reasoning doesn\u2019t matter.<\/p>\n<p>\u201cNet-net this is a great win for the good guys. No matter what the motives of the operators of the Shade (Troldesh) ransomware, we will take it,\u201d he told SC Media. \u201cWhile this might mean that they are out of the game for good, it\u2019s not the first time that a group of attackers has torn down their infrastructure and gone dormant only to resurface later using different infrastructures and the same set of tools.\u201d<\/p>\n<p>In addition to supplying the keys the group posted detailed instructions along with a note that if a victim still has problems decrypting their files to wait for the security companies to post tools to better utilize the information provide. It was also noted that some of the published software is detected by some antiviruses because it uses common code blocks with the encryptor. To avoid the deletion of them all the .exe files were zipped by the gang with the same password: 123454321.<\/p>\n<p>\u201cI also noticed that they have posted decryption tools on their repositories. Given their past history, my advice is not to use those tools as it is a risk that most organizations and individuals should not take,\u201d Shahidzadeh said. \u201cInstead, I recommend waiting until trusted actors ,such as AV companies, produce a decryption tool.\u201d<\/p>\n<p>Shade was heavily used from about January 2019 through November 2019 with attacks trailing off starting in January 2020, which would support the gang\u2019s claim that it halted distribution late last year.<\/p>\n<p>Whether or not Shade is stepping aside remains to be see. The\u00a0<a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/ransomware\/gandcrab-ransomware-operators-put-in-retirement-papers\/\">Gandcrab\u00a0<\/a>ransomware gang posted a retirement notice in June 2019 but recent reports have the threat actors re-emerging under the\u00a0<a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/report-suggests-gandcrabs-developers-may-have-created-sodinokibi-ransomware\/\">Sodinokibi\u00a0<\/a>moniker.<\/p>\n<p>More recently the cyber actors behind the\u00a0<a href=\"https:\/\/www.scmagazine.com\/?s=Nemty&amp;orderby=date&amp;order=desc\">Nemty<\/a>\u00a0ransomware-as-a-service operation are reportedly folding up shop as they concentrate their efforts on a newly launched malicious encryptor.<\/p>\n<p>The decision to shut down Nemty could leave some individuals in a lurch. As of April 14, the cybercriminals are giving victims one week to pay their ransom and receive a decryption key before Nemty\u2019s payment infrastructure is supposedly dismantled. This ticking clock could coerce some panicked victims to hastily pay up.<\/p>\n<p>Original article &#8211; https:\/\/www.scmagazine.com\/home\/security-news\/ransomware\/shade-ransomware-gang-gives-up-keys-apologizes-to-victims\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The malicious actors behind Shade ransomware made an unusual announcement on GitHub, not only publishing all 750,000 decryptor keys for the malware but apologizing for their criminal actions. \u201cWe are the team which created a trojan-encryptor mostly known as Shade, Troldesh or Encoder.858. In fact, we stopped its distribution in the end of 2019.\u201d the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":52,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-38","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","entry"],"jetpack_featured_media_url":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-content\/uploads\/2020\/05\/Ransomeware.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-json\/wp\/v2\/posts\/38","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":1,"href":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-json\/wp\/v2\/posts\/38\/revisions"}],"predecessor-version":[{"id":39,"href":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-json\/wp\/v2\/posts\/38\/revisions\/39"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-json\/wp\/v2\/media\/52"}],"wp:attachment":[{"href":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-json\/wp\/v2\/media?parent=38"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-json\/wp\/v2\/categories?post=38"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.solutionsunlimitedsc.com\/blog\/wp-json\/wp\/v2\/tags?post=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}