Regarding Sicarii’s broken decryption process, researchers said that “during execution, the malware regenerates a new RSA key pair locally, uses the newly generated key material for encryption, and then discards the private key.”

  • Cevilia (they/she/…)@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    68
    ·
    1 day ago

    Even if the malware author did correct the issue, it’s unknown whether those already compromised can benefit, or if they’re out of luck.

    They literally said the private key was discarded. It’s absolutely known whether those already compromised can benefit. They can’t.

    • Natanael@infosec.pub
      link
      fedilink
      arrow-up
      11
      ·
      10 hours ago

      Well, unless they also made key generation shitty, because that’s equally plausible and would likely allow RSA keys to be broken (it’s surprisingly hard to generate RSA keys safely)