Bitdefender Partnership with Law Enforcement Yields MegaCortex Decryptor
We have just released a decryptor for the MegaCortex ransomware family. This decryptor was built in cooperation with Europol, the NoMoreRansom Project, the Zürich Public Prosecutor's Office and the Zürich Cantonal Police.
In October 2021, twelve individuals were arrested in an international law enforcement operation against Dharma, MegaCortex and LockerGoga ransomware.
This group was responsible for an estimated 1,800 infections, mostly targeting companies. Following the LockerGoga decryptor, we now release a universal tool for MegaCortex infections.
Get your data back
Important note: Victims with data encrypted by versions 2 through 4 need the ransom note (e.g. “!!READ_ME!!!.TXT”, “!-!README!-!.RTF”, etc) present. MegaCortex V1 decryption (the encrypted files have the “.aes128ctr” extension appended) requires the presence of the ransom note and TSV log file (e.g. “fracxidg.tsv”) created by the ransomware.
If you or your company have been affected by MegaCortex, you can now use the tool below to recover your files for free. We have a step-by-step tutorial on how to operate the decryptor in both single-computer and network modes.
BackdoorDiplomacy Wields New Tools in Fresh Middle East Campaign
December 06, 2022
Side-Loading OneDrive for profit – Cryptojacking campaign detected in the wild
October 05, 2022
A Red Team Perspective on the Device42 Asset Management Appliance
August 10, 2022
Vulnerabilities Identified in Wyze Cam IoT Device
March 29, 2022
New FluBot and TeaBot Global Malware Campaigns Discovered
January 26, 2022
Bitdefender Honeypots Signal Active Log4Shell 0-Day Attacks Underway; Patch Immediately
December 10, 2021