{"id":15082,"date":"2023-03-21T09:25:48","date_gmt":"2023-03-21T09:25:48","guid":{"rendered":"https:\/\/education.telefony-taksi.ru\/?p=15082"},"modified":"2023-04-24T17:30:00","modified_gmt":"2023-04-24T17:30:00","slug":"linux-encoder-1-uses-computable-key-bitdefender","status":"publish","type":"post","link":"https:\/\/education.telefony-taksi.ru\/linux-encoder-1-uses-computable-key-bitdefender.html","title":{"rendered":"Linux.encoder.1 uses computable key – bitdefender has cracked it"},"content":{"rendered":"

A short time ago, a ransomware was discovered that targeted Linux users. One has the malware named Linux.Encoder.1 denoted.<\/p>\n

If the malicious code was able to infect a server or computer, various files were encrypted. To obtain the key, the cyber extortionists demanded a bitcoin.<\/p>\n

However, it must also be said that you can actually only get infected through your own fault. An administrator must run the file with root privileges and only then can Linux.Encoder.1 to make its mischief.<\/p>\n

Linux.Encoder.1 can be cracked<\/h3>\n

Fortunately, there are clever minds not only on the dark side of digital power, but also the others have something up their sleeve. In this case it is Bitdefender Labs.<\/p>\n

The company reports that you don't need to crack RSA if you can guess the key.<\/p>\n

The developers have made a mistake, which the experts at Bitdefender noticed when they downloaded a sample of Linux.Encoder.1 taken under closer scrutiny.<\/p>\n

The AES key is generated locally on the victim's computer. Now you have a bit of reverse engineering on Linux.Encoder.1 and looked at how the key and initialization vector are generated. Instead of taking completely random keys and IVs, the malware took this information from the rand() function plus the timestamp of when the file was encrypted. Now you already had a big piece of the puzzle, as you can obtain this timestamp from the encrypted file. It is quite a flaw in the design because you can get the AES key without having to buy the public RSA key.<\/p>\n

Automatic tool for decryption is available<\/h3>\n

Who from Linux.Encoder.1 is infected, can now have his system automatically decrypted – or the files restored to the state before encryption with the malicious code. The tool determines the IV and the key by simply analyzing the file. If you can start a compromised system, you should download the script and run it as superuser root.<\/p>\n

It may be that the entire system is compromised and simply won't boot up. In this case you have to boot from a live CD.<\/p>\n

\"These<\/p>\n

With these files Linux.Encoder.1 beat<\/p>\n

Step by step<\/h3>\n