PC Magazine - USA (2019-11)

(Antfer) #1

0LFKDHO*LOOHVSLHLVDPRQJWKRVHUHVHDUFKHUV+H¶VD
SURJUDPPHUE\GD\EXWLQKLVIUHHWLPHKHZRUNVDVD
UDQVRPZDUHKXQWHUIRUWKH1HZ=HDODQGEDVHG
DQWLYLUXV¿UP(PVLVRIWDOHDGLQJSURYLGHURI
ransomware decryptors. Desperate victims frequently
UHDFKRXWWRKLPIRUKHOS³,FDQJHWDQ\ZKHUHIURP
WRSHRSOHFRQWDFWLQJPHSHUGD\,W¶VFUD]\ ́KHVDLG
in an interview.


FINDING THE BUGS
:KHQDUDQVRPZDUHLQIHFWLRQKLWV\RXU3&WKH
PDOLFLRXVFRGHHQFU\SWV\RXU¿OHVDQGSRVWVDQRWH
GHPDQGLQJ\RXSD\XSRUQHYHUVHH\RXUGDWDDJDLQ,I
\RXJLYHLQWKHKDFNHUVZLOO VXSSRVHGO\ VHQG\RXD
GHFU\SWLRQNH\WRUHFRYHU\RXU¿OHV²EXWRIWHQGRQ¶W
IROORZWKURXJK/LNHDQ\SLHFHRIVRIWZDUHWKRXJKD
ransomware strain can be buggy.


7KHEXJVFDQKDSSHQIRUDQXPEHURIUHDVRQV7KH
KDFNHUEHKLQGWKHPDOLFLRXVFRGHPD\EHDQHZELH2U
WKHUDQVRPZDUHLWVHOIPD\EHDQHDUO\¿UVWYHUVLRQDQG
KDV\HWWRZRUNRXWDOOLWVNLQNV,IWKHUH¶VDZHDNQHVVLQ
WKHHQFU\SWLRQDOJRULWKP²WKHFUXFLDOSURFHVVWKDWZLOO
WXUQ\RXU¿OHVLQWRJLEEHULVK²WKHQDUHVHDUFKHUFDQ
SRWHQWLDOO\XQUDYHODUDQVRPZDUHDWWDFNDQGUHYHUVHWKH
LQIHFWLRQ*LOOHVSLHKDVH[SORLWHGWKRVHYXOQHUDELOLWLHVWR
FUHDWHDQHVWLPDWHGGHFU\SWRUVZKLFKDQ\RQHFDQ
download for free.


³7KHJROGHQUXOHLVWKDW>FU\SWRJUDSK\@LVKDUGDQG
UDQVRPZDUHGHYHORSHUVDUHKXPDQWRR ́LOOHVSLHVDLG
/DWHO\YLFWLPVKDYHEHHQUHDFKLQJRXWWRKLPIRUKHOSWR
UHFRYHUIURPWKH³6723'-98 ́VWUDLQZKLFKRIWHQ
FRPHVSDFNDJHGZLWKSLUDWHGVRIWZDUH)RUWXQDWHO\
LOOHVSLHZDVDEOHWRFUHDWHDGHFU\SWRUVLQFHHDUO\
YHUVLRQVRIWKHDWWDFNHPEHGGHGDXVDEOHGHFU\SWLRQ
NH\WRUHYHUVHWKHLQIHFWLRQZLWKLQWKHUDQVRPZDUH¶V
computer code.


If there’s a
weakness
in the
encryption
algorithm, a
researcher
could unravel
a ransomware
attack.
Free download pdf