Hackers shut down Shade ransomware and release keys

(Image credit: Shutterstock)

The hackers behind the notorious Shade ransomware have shut down their operations and released over 750,000 decryption keys along with instructions to help victims decrypt their data.

The group, also known as Troldesh or Encoder.858 had been active since 2014, mostly targeting users in Russia and Ukraine. In a message left on a Github repository, the group revealed that it had stopped targeting victims since the end of 2019, however they did not reveal the reasons for shutting down. 

The hackers have published the decryption keys along with their decryption software aiming that antivirus companies can create better tools to help users decrypt their data. Kaspersky has already verified the keys and announced that it is creating a free decryption tool.

Shade ransomware

As well as apologizing to all their victims, the Github post of the operators of the ransomware suggests that they have deleted all the source codes. 

“We are the team which created a trojan-encryptor mostly known as Shade, Troldesh or Encoder.858. In fact, we stopped its distribution in the end of 2019. Now we made a decision to put the last point in this story and to publish all the decryption keys we have (over 750 thousands at all)," the post read

“We are also publishing our decryption soft; we also hope that, having the keys, antivirus companies will issue their own more user-friendly decryption tools. All other data related to our activity (including the source codes of the trojan) was irrevocably destroyed. We apologize to all the victims of the trojan and hope that the keys we published will help them to recover their data,” it added.

Experts suggest that Shade ransomware was one of the oldest and most active ransomware strains in existence. While hackers used a combination of email scam and exploit kits to distribute it, it was not considered as perfect since antivirus tools, including Kaspersky and McAfee, were successful in decrypting some systems.

It is likely that these keys are valid for all the versions of Shade ransomware and may be valid for all the users who were impacted. While the security researchers may come up with an easy tool to decrypt data, there may be very few users who have still stored their encrypted data as people generally wipe the infected devices to install fresh operating systems.

Via: Bleepingcomputer

Jitendra Soni

Jitendra has been working in the Internet Industry for the last 7 years now and has written about a wide range of topics including gadgets, smartphones, reviews, games, software, apps, deep tech, AI, and consumer electronics.  

Latest in Security
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple H3C Magic routers hit by critical severity remote command injection, with no fix in sight
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
Latest in News
girl using laptop hoping for good luck with her fingers crossed
Windows 11 24H2 seems to be a massive fail – so Microsoft apparently working on 25H2 fills me with hope... and fear
ChatGPT Advanced Voice mode on a smartphone.
Talking to ChatGPT just got better, and you don’t need to pay to access the new functionality
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple H3C Magic routers hit by critical severity remote command injection, with no fix in sight
Apple Watch Ultra 2 timer
The Apple Watch is getting a sleep alarm upgrade it probably should have had 10 years ago
Nikon Z5
The Nikon Z5 II could land soon – here's what to expect from Nikon's rumored entry-level full-frame camera
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users