{"id":8243,"date":"2017-07-06T10:10:32","date_gmt":"2017-07-06T18:10:32","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/06\/news-2018\/"},"modified":"2017-07-06T10:10:32","modified_gmt":"2017-07-06T18:10:32","slug":"news-2018","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/07\/06\/news-2018\/","title":{"rendered":"The key to old Petya versions has been published by the malware author"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 06 Jul 2017 17:06:15 +0000<\/strong><\/p>\n<p>As research concluded, the original author of Petya, Janus, was not involved in the latest attacks on Ukraine. His original malware was pirated and extended by an unknown actor (read more <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/06\/eternalpetya-yet-another-stolen-piece-package\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>). As a result of the recent events, Janus probably decided to shut down the Petya project. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/teslacrypt-shuts-down-and-releases-master-decryption-key\/\" target=\"_blank\" rel=\"noopener noreferrer\">Similarly to the authors of TeslaCrypt<\/a>, he released his private key, allowing all the victims of the previous Petya attacks, to get their files back.<\/p>\n<p>(The author of Petya has been known for previously leaking the keys of his rival, Chimera ransomware &#8211; details <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2016\/07\/keys-to-chimera-ransomware-leaked\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>).<\/p>\n<h3>What exactly happened?<\/h3>\n<p>Yesterday, Janus has made a public announcement on Twitter:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-18744\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/announcement.png\" alt=\"\" width=\"588\" height=\"96\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/announcement.png 588w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/announcement-300x49.png 300w\" sizes=\"auto, (max-width: 588px) 100vw, 588px\" \/><\/p>\n<p>The message contained a link to the file, hosted at <em>mega.nz<\/em> service.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-18745\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/file_at_meganz.png\" alt=\"\" width=\"806\" height=\"443\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/file_at_meganz.png 806w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/file_at_meganz-300x165.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/file_at_meganz-600x330.png 600w\" sizes=\"auto, (max-width: 806px) 100vw, 806px\" \/><\/p>\n<p>The linked file was encrypted and password protected:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-18746\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/key_format.png\" alt=\"\" width=\"703\" height=\"290\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/key_format.png 703w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/key_format-300x124.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/key_format-600x248.png 600w\" sizes=\"auto, (max-width: 703px) 100vw, 703px\" \/><\/p>\n<p>After guessing the password and decrypting the package with the help of <em>openssl<\/em>, I got the following plaintext:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-18747\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/command_line.png\" alt=\"\" width=\"1132\" height=\"166\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/command_line.png 1132w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/command_line-300x44.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/command_line-600x88.png 600w\" sizes=\"auto, (max-width: 1132px) 100vw, 1132px\" \/><\/p>\n<pre>Congratulations!  Here is our secp192k1 privkey:  38dd46801ce61883433048d6d8c6ab8be18654a2695b4723  We used ECIES (with AES-256-ECB) Scheme to encrypt the decryption password into the \"Personal Code\" which is BASE58 encoded.<\/pre>\n<p>The verification process will take some time, but so far it seems that this is Janus&#8217; private key for all the previous Petyas.<\/p>\n<h3>Can it help in case of EternalPetya\/NotPetya?<\/h3>\n<p>This key cannot help in case of EternalPetya, since, in this particular case, the Salsa keys are not encrypted with Janus&#8217; public key, but, instead of this, erased and lost forever (<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/06\/eternalpetya-lost-salsa20-key\/\" target=\"_blank\" rel=\"noopener noreferrer\">read more<\/a>). It can only help the people who were attacked by Petya\/Goldeneye in the past.<\/p>\n<h3>What is the value added by having this key?<\/h3>\n<p>Just to recall, the first version of Petya, <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/04\/petya-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">Red Petya<\/a>, has been successfully cracked by <a href=\"https:\/\/twitter.com\/leo_and_stone\" target=\"_blank\" rel=\"noopener noreferrer\">leo_and_stone<\/a>. Based on his work, various decryptors have been released, i.e. antipetya live CD.<\/p>\n<p><a href=\"https:\/\/twitter.com\/hasherezade\/status\/733090074255097856\" target=\"_blank\" rel=\"noopener noreferrer\">The error in the second version<\/a> &#8211; a.k.a. <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/05\/petya-and-mischa-ransomware-duet-p1\/\" target=\"_blank\" rel=\"noopener noreferrer\">Green Petya<\/a>, revealed by me, was not as severe. Yet, it allowed for writing a bruforcer. Thanks to the GPU-based solution implemented by <a href=\"https:\/\/twitter.com\/procrash\" target=\"_blank\" rel=\"noopener noreferrer\">procrash<\/a>, the process of cracking the Salsa key has been sped up to 3 days.<\/p>\n<p>Higher versions fixed the flaws to an extent making cracking of the Salsa key no longer possible.<\/p>\n<p>Thanks to the currently published master key, all the people who have preserved the images of the disks encrypted by the relevant versions of Petya, may get a chance of getting their data back.<\/p>\n<p><strong>Further research related to the verification of the obtained material and the decryptor is in progress. We will keep you updated, please stay tuned!<\/strong><\/p>\n<h3>Appendix<\/h3>\n<p>Goldeneye &#8211; the last Petya version released by Janus:<\/p>\n<blockquote data-secret=\"Q0BbUj4Qul\" class=\"wp-embedded-content\">\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/12\/goldeneye-ransomware-the-petyamischa-combo-rebranded\/\">Goldeneye Ransomware &#8211; the Petya\/Mischa combo rebranded<\/a><\/p>\n<\/blockquote>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/12\/goldeneye-ransomware-the-petyamischa-combo-rebranded\/embed\/#?secret=Q0BbUj4Qul\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><em><span class=\"s1\">This was a guest post written by Hasherezade, an independent researcher and programmer with a strong interest in InfoSec.\u00a0<\/span><span class=\"s1\">She loves going in details about malware and sharing threat information with the community.\u00a0<\/span><span class=\"s2\">Check her out on Twitter @<a href=\"https:\/\/twitter.com\/hasherezade\" target=\"_blank\" rel=\"noopener noreferrer\">hasherezade<\/a>\u00a0and her personal blog:\u00a0<span class=\"s3\"><a href=\"https:\/\/hshrzd.wordpress.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/hshrzd.wordp<\/a>.<\/span><\/span><\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/the-key-to-the-old-petya-has-been-published-by-the-malware-author\/\">The key to old Petya versions has been published by the malware author<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/the-key-to-the-old-petya-has-been-published-by-the-malware-author\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 06 Jul 2017 17:06:15 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/the-key-to-the-old-petya-has-been-published-by-the-malware-author\/' title='The key to old Petya versions has been published by the malware author'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/shutterstock_245619199.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>As research concluded, the original author of Petya, Janus, was not involved in the latest attacks on Ukraine. As a result of the recent events, Janus released his private key, allowing all the victims of the previous Petya attacks, to get their files back.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/malware\/\" rel=\"category tag\">Malware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/chimera\/\" rel=\"tag\">Chimera<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/chimera-ransomware\/\" rel=\"tag\">Chimera ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eternalpetya\/\" rel=\"tag\">EternalPetya<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/goldeneye-ransomware\/\" rel=\"tag\">Goldeneye ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/janus\/\" rel=\"tag\">janus<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/notpetya\/\" rel=\"tag\">NotPetya<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/petya\/\" rel=\"tag\">petya<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/petya-ransomware\/\" rel=\"tag\">Petya ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/teslacrypt\/\" rel=\"tag\">teslacrypt<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/the-key-to-the-old-petya-has-been-published-by-the-malware-author\/' title='The key to old Petya versions has been published by the malware author'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/the-key-to-the-old-petya-has-been-published-by-the-malware-author\/\">The key to old Petya versions has been published by the malware author<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12913,12914,4503,12849,10586,12863,3764,12830,12823,10588,3765,12915],"class_list":["post-8243","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-chimera","tag-chimera-ransomware","tag-cybercrime","tag-eternalpetya","tag-goldeneye-ransomware","tag-janus","tag-malware","tag-notpetya","tag-petya","tag-petya-ransomware","tag-ransomware","tag-teslacrypt"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8243"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8243\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}