Last Updated: 2016-04-11 19:11:26 UTC
by John Bambenek (Version: 1)
Recently a research who goes by @leo_and_stone has released a tool that will decrypt files on a Petya infected disk. A long form of the details are available over at BleepingComputer but the short version is that by removing the disk and getting a 512-byte sequence from sector 53 of the disk and an 8-byte none from sector 54. Then converting this to Base64 you can upload it to https://petya-pay-no-ransom.herokuapp.com/ to retrieve the key (in most cases in seconds). Ransomware historically has had problem getting the encryption "correct" to avoid mistakes that allow people to reverse engineer the decryption key and it has happened for several prominent families. Unfortunately, such successes are usually short-lived as attackers figure out their mistakes (in weeks to a few months, maybe) and adapt.
Many researchers are putting in efforts to disrupt ransomware and expect more of this in these the future. If you have used this tool, let us know your experiences in the comments.
bambenek \at\ gmail /dot/ com