Bitdefender has published a free MegaCortex ransomware decryptor, which it co-developed with the Europol, Cantonal Police, Zurich Public Prosecutro's Office, and the NoMoreRansom project, BleepingComputer reports.
No installation is required for the decryptor, which could automatically locate encrypted files on the system, as well as perform backups for the encrypted data in case of any error in the decryption process. The free MegaCortex decryptor also has an advanced setting enabling those who had tried file decryption to use clean files.
First identified in May 2019, the MegaCortex ransomware initially targeted corporate networks before launching more targeted intrusions in succeeding months, prompting the ransomware to gain the attention of law enforcement agencies. Individuals behind 1,800 ransomware attacks, mainly with MegaCortex and LockerGoga, were then arrested by the Europol in October 2021.
"This analysis revealed numerous private keys from ransomware attacks. These keys enable damaged companies and institutions to restore data previously encrypted with the 'LockerGoga' or 'MegaCortex' malware," said the Zurich Public Prosecutor's Office.
TechCrunch reports that U.S. conservative think tank The Heritage Foundation was working on addressing a cyberattack against its systems last week, but investigation into whether any of its data was compromised is still underway.
Nexperia had some of its servers confirmed to be compromised in a cyberattack last month following a report from Dutch broadcast firm RTL detailing attackers' claims of having exfiltrated hundreds of gigabytes of data from the Chinese-owned Dutch semiconductor manufacturer, according to Cybernews.
Iranian state-backed threat operation MuddyWater, also known as TA450, Mango Sandstorm, and Boggy Sandstorm, has leveraged the novel DarkBeatC2 command-and-control infrastructure tool as part of its latest attack campaign, The Hacker News reports.