Regarding Sicarii’s broken decryption process, researchers said that “during execution, the malware regenerates a new RSA key pair locally, uses the newly generated key material for encryption, and then discards the private key.”

  • pivot_root@lemmy.world
    link
    fedilink
    arrow-up
    54
    ·
    1 day ago

    A hash is at least consistent when given identical inputs. What they created is more like a digital incinerator.

      • anton@lemmy.blahaj.zone
        link
        fedilink
        arrow-up
        6
        ·
        9 hours ago

        -u would give you the space back.
        The ransomware doesn’t. There is a block of data, sitting there, taunting you.

        • Jayjader@jlai.lu
          link
          fedilink
          arrow-up
          1
          ·
          8 hours ago

          ehehehehe thanks for that mental image

          Of course, one can always reclaim that space if the data truly is inaccessible. Makes me want to write a joke program for “cleaning up” after ransomware that just removes the data from the partition table (or whatever the equivalent for files is - would that just be rm?)