{"id":16888,"date":"2020-06-08T16:18:43","date_gmt":"2020-06-08T20:18:43","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/fake-djvu-ransomware-decryptor\/16888\/"},"modified":"2020-09-02T21:30:55","modified_gmt":"2020-09-02T17:30:55","slug":"fake-djvu-ransomware-decryptor","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/fake-djvu-ransomware-decryptor\/16888\/","title":{"rendered":"Encrypting the encrypted: Zorab Trojan in STOP decryptor"},"content":{"rendered":"<p>What do people do if they discover that ransomware has encrypted their files? \u00a0First panic, probably, then worry, then look for ways to recover data without paying any ransom to the attackers (<a href=\"https:\/\/www.kaspersky.com\/blog\/no-no-ransom\/13364\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">which would be pointless, anyway<\/a>). In other words, they go online to Google a solution or ask for advice on social networks. That is exactly what the creators of the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-ransomware-decryptor-double-encrypts-desperate-victims-files\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Zorab Trojan<\/a> want, having embedded the malware into a tool that purports to help STOP\/Djvu victims.<\/p>\n<h2>Fake STOP decryptor as bait<\/h2>\n<p>In fact, the cybercriminals have decided to exacerbate the problems already facing the victims of the STOP\/Djvu ransomware, which encrypts data and, depending on the version, assigns an extension \u2014 options include .djvu, .djvus, .djvuu, .tfunde, and .uudjvu \u2014 to the modified files. Zorab\u2019s creators released a utility that supposedly decrypts these files, but it actually encrypts them all over again.<\/p>\n<p>You can indeed decrypt files that earlier versions of STOP compromised \u2014 Emsisoft released a <a href=\"https:\/\/www.emsisoft.com\/ransomware-decryption-tools\/stop-djvu\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">tool<\/a> back in October 2019. But modern versions use a more reliable encryption algorithm that current technology cannot crack. So at least for now, no decryption utility exists for modern versions of STOP\/Djvu.<\/p>\n<p>We say \u201cfor now\u201d because decryption tools appear in one of two cases: either the cybercriminals make an error in the encryption algorithm (or simply use a weak cipher), or the police locate and seize their servers. Sure, the creators might voluntarily publish the keys, but that\u2019s a very long shot \u2014 and even if they do, infosec companies still have to create a handy utility that victims can use to restore their data. That happened with the keys for files hit by Shade ransomware, and we <a href=\"https:\/\/noransom.kaspersky.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">published a decryption program in April this year<\/a>.<\/p>\n<h2>How to know if a decryptor is fake<\/h2>\n<p>Anonymous well-wishers are extremely unlikely to create a decryption utility and place it on some unknown site, or supply a direct link on a forum or social network. You can find genuine utilities on infosec companies\u2019 websites or on specialized portals dedicated to combating ransomware, such as <a href=\"https:\/\/www.nomoreransom.org\/en\/index.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">nomoreransom.org<\/a>. Treat tools hosted elsewhere with suspicion.<\/p>\n<p>Cybercriminals rely on panic, knowing someone who has lost files to a cryptor will grasp at any straw. Even if you believe a tool is bona fide, though, it\u2019s important to remain calm and objective and verify the site properly. If you have any suspicions at all about its legitimacy, don\u2019t touch the tool.<\/p>\n<h2>How to guard against Zorab and other ransomware<\/h2>\n<ul>\n<li>Do not follow suspicious links or run executable files if you do not trust their source.\u00a0If you are looking for a decryptor, the most reliable sources \u2014 the places you should start searching \u2014 will be <a href=\"http:\/\/noransom.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">noransom.kaspersky.com<\/a>, <a href=\"http:\/\/nomoreransom.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">nomoreransom.org<\/a> (a joint project run by several companies), and the sites of other security solution vendors. If you find a utility elsewhere, then we strongly advise checking the legitimacy of its authors and the site where it was published before you even think about using it.<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-backup\/19589\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Make backup copies of important files<\/a>.<\/li>\n<li>Use a <a href=\"https:\/\/me-en.kaspersky.com\/plus?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">reliable security solutions <\/a> that detects known ransomware and, when encountering something unknown, identifies and blocks attempts to modify files.<\/li>\n<\/ul>\n<p>For companies that fear ransomware but rely on other protection, we offer the standalone <a href=\"https:\/\/me-en.kaspersky.com\/blog\/kaspersky-anti-ransomware-tool-for-business\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=me-en_KB_nv0092&amp;utm_content=link&amp;utm_term=me-en_kdaily_organic_1drobvqxak929hs\" target=\"_blank\" rel=\"noopener\">Kaspersky Anti-Ransomware Tool<\/a>. Compatible with most security solutions, it detects the threats that can break through their lines of defense.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kart\">\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.<\/p>\n","protected":false},"author":2581,"featured_media":16889,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[1239,1214,1203,433],"class_list":{"0":"post-16888","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-decryptors","10":"tag-nomoreransom","11":"tag-noransom","12":"tag-ransomware"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/fake-djvu-ransomware-decryptor\/16888\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/fake-djvu-ransomware-decryptor\/21423\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/fake-djvu-ransomware-decryptor\/8328\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/fake-djvu-ransomware-decryptor\/22519\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/fake-djvu-ransomware-decryptor\/20664\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/fake-djvu-ransomware-decryptor\/19068\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/fake-djvu-ransomware-decryptor\/22906\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/fake-djvu-ransomware-decryptor\/21919\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/fake-djvu-ransomware-decryptor\/28554\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/fake-djvu-ransomware-decryptor\/8431\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/fake-djvu-ransomware-decryptor\/35824\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/fake-djvu-ransomware-decryptor\/15047\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/fake-djvu-ransomware-decryptor\/15582\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/fake-djvu-ransomware-decryptor\/13550\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/fake-djvu-ransomware-decryptor\/24238\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/fake-djvu-ransomware-decryptor\/11571\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/fake-djvu-ransomware-decryptor\/28621\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/fake-djvu-ransomware-decryptor\/25531\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/fake-djvu-ransomware-decryptor\/22450\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/fake-djvu-ransomware-decryptor\/27706\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/fake-djvu-ransomware-decryptor\/27548\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=16888"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16888\/revisions"}],"predecessor-version":[{"id":16890,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16888\/revisions\/16890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16889"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=16888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=16888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=16888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}