{"id":5540,"date":"2016-08-24T05:01:44","date_gmt":"2016-08-24T09:01:44","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=5540"},"modified":"2019-11-15T15:24:08","modified_gmt":"2019-11-15T11:24:08","slug":"wildfire-ransomware-decryptor","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/wildfire-ransomware-decryptor\/5540\/","title":{"rendered":"WildFire ransomware extinguished"},"content":{"rendered":"<p>It\u2019s no secret: ransomware is a painful threat. And it\u2019s not going to disappear anytime soon \u2014 with a few exceptions, of course.<\/p>\n<p><b>Good news:<\/b>\u00a0This is the story of one such exception. Recently, Kaspersky Lab helped Dutch police to disable another type of ransomware \u2014 WildFire, which mainly terrorized citizens of the Netherlands.<\/p>\n<p>WildFire was one of those greedy Trojans that want your money quickly \u2014 it demanded additional compensation for payment delays. In this case, the malware demanded $300 within eight days. After that, the amount tripled.<\/p>\n<p>The National High Tech Crime Unit of the Dutch police seized a command-and-control server that contained 5,800 decryption keys. We used the data to make a new decryption tool, which we published on\u00a0<a href=\"http:\/\/nomoreransom.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">nomoreransom.org<\/a>,\u00a0<a href=\"http:\/\/kas.pr\/5hZo\" target=\"_blank\" rel=\"noopener noreferrer\">noransom.kaspersky.com<\/a>, and\u00a0<a href=\"http:\/\/support.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">support.kaspersky.com<\/a>.<\/p>\n<p>The Dutch police replaced the malicious server with a new one that sends notifications to all victims of WildFire that they can download the decryption tool free.<\/p>\n<h3>Flashing back<\/h3>\n<p>From the very beginning, WildFire targeted Dutch and Belgian people. In fact, more than 90% of the victims were from the Netherlands and Belgium.<\/p>\n<p>WildFire spread by spam that, in flawless Dutch, notified people that a transport company had failed to deliver a package. The message contained a link to download a form for the recipient to use to reschedule the delivery. The website had a Dutch domain name and overall looked convincing.<\/p>\n<p>Victims visited the site, downloaded the document, opened it, and in doing so activated a malicious macros, which in turn downloaded and executed WildFire. As the manifestation of criminals\u2019 intentions, the code of the macros included lyrics from the Pink Floyd song \u201cMoney\u201d (as well as several variants with names in Polish).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5542\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2016\/08\/05103204\/wildfire-screen.png\" alt=\"wildfire-screen\" width=\"866\" height=\"447\"><\/p>\n<h3>How to protect yourself<\/h3>\n<p>If there were only one type of malware and one means of delivery, cybersecurity would be a piece of cake. Unfortunately, it\u2019s not, and there are millions of other threats. To stay safe, follow our advice:<\/p>\n<p>1. If you are a WildFire victim, download a decryptor from\u00a0<a href=\"http:\/\/nomoreransom.org\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">nomoreransom.org<\/a>. The portal also contains decryption tools for dozens of other types of ransomware.<\/p>\n<p>2. After decrypting your files, scan your PC \u2014 may be WildFire is not the only malware that crept into the system. You can run a scan with the free\u00a0<a href=\"http:\/\/support.kaspersky.com\/8517?_ga=1.170570595.2111903088.1454935021\" target=\"_blank\" rel=\"noopener noreferrer\">Kaspersky Virus Removal Tool<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">10 tips to protect your files from ransomware <a href=\"https:\/\/t.co\/o0IpUU9CHb\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/o0IpUU9CHb<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/iteducation?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#iteducation<\/a> <a href=\"https:\/\/t.co\/I47sPIiWFF\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/I47sPIiWFF<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/671348678607642624?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 30, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>3. WildFire was delivered with the help of fraudulent e-mails. That\u2019s why we highly recommend understanding how phishing works. Vigilance is key: If you didn\u2019t order a package, then who sent you one? An unexpected package isn\u2019t necessarily bad news, but the mystery should alert you to the possibility of fraud. If you can, open suspicious files in a virtual machine.<\/p>\n<p>4. If one piece of malware has found its way into your system, that is an obvious sign other malware can do so as well. That\u2019s why it\u2019s so important to protect your system with a good antivirus solution. Of course, we are partial to\u00a0<a href=\"http:\/\/kas.pr\/8MGq\" target=\"_blank\" rel=\"noopener noreferrer\">our own Kaspersky Internet Security<\/a>, but regardless of your choice, we strongly urge everyone to use security software on every connected device: Install it, run it, and keep it up to date.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s no secret: ransomware is a painful threat. And it\u2019s not going to disappear anytime soon \u2014 with a few exceptions, of course. Good news:\u00a0This is the story of one<\/p>\n","protected":false},"author":522,"featured_media":5541,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1211,1212,1213,726,1215,1214,433,1216],"class_list":{"0":"post-5540","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cryptor","9":"tag-decryptor","10":"tag-dutch-police","11":"tag-free","12":"tag-no-ransom","13":"tag-nomoreransom","14":"tag-ransomware","15":"tag-wildfire"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/wildfire-ransomware-decryptor\/5540\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/wildfire-ransomware-decryptor\/7593\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/wildfire-ransomware-decryptor\/7553\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/wildfire-ransomware-decryptor\/8976\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/wildfire-ransomware-decryptor\/8836\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/wildfire-ransomware-decryptor\/2368\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/wildfire-ransomware-decryptor\/12828\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/wildfire-ransomware-decryptor\/5998\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/wildfire-ransomware-decryptor\/6494\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/wildfire-ransomware-decryptor\/5286\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/wildfire-ransomware-decryptor\/8524\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/wildfire-ransomware-decryptor\/12348\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/wildfire-ransomware-decryptor\/12828\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/wildfire-ransomware-decryptor\/12828\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cryptor\/","name":"cryptor"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5540"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5540\/revisions"}],"predecessor-version":[{"id":14856,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5540\/revisions\/14856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5541"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}