论文标题

一种解释被Hive Ransomware感染的数据的方法

A Method for Decrypting Data Infected with Hive Ransomware

论文作者

Kim, Giyoon, Kim, Soram, Kang, Soojin, Kim, Jongsung

论文摘要

在许多类型的恶意代码中,勒索软件构成了主要威胁。勒索软件加密数据并要求赎金以换取解密。由于数据恢复是不可能的,如果未获得加密密钥,一些公司遭受了相当大的损害,例如支付大量资金或重要数据丢失。在本文中,我们分析了Hive Ransomware,该软件发生在2021年6月。Hive勒索软件造成了巨大伤害,导致FBI发布了警报。为了最大程度地减少Hive勒索软件造成的损害并帮助受害者恢复文件,我们分析了Hive勒索软件并研究了恢复方法。通过分析Hive Ransomware的加密过程,我们通过使用自己的加密算法来确认存在漏洞。我们已经恢复了用于生成文件加密密钥的主密钥,以使Hive Ransomware加密的数据解密。我们在没有攻击者的RSA私钥的情况下恢复了95%的主密钥,并解密了实际受感染的数据。据我们所知,这是解密Hive勒索软件的首次成功尝试。预计我们的方法可用于减少由Hive Ransomware造成的损害。

Among the many types of malicious codes, ransomware poses a major threat. Ransomware encrypts data and demands a ransom in exchange for decryption. As data recovery is impossible if the encryption key is not obtained, some companies suffer from considerable damage, such as the payment of huge amounts of money or the loss of important data. In this paper, we analyzed Hive ransomware, which appeared in June 2021. Hive ransomware has caused immense harm, leading the FBI to issue an alert about it. To minimize the damage caused by Hive Ransomware and to help victims recover their files, we analyzed Hive Ransomware and studied recovery methods. By analyzing the encryption process of Hive ransomware, we confirmed that vulnerabilities exist by using their own encryption algorithm. We have recovered the master key for generating the file encryption key partially, to enable the decryption of data encrypted by Hive ransomware. We recovered 95% of the master key without the attacker's RSA private key and decrypted the actual infected data. To the best of our knowledge, this is the first successful attempt at decrypting Hive ransomware. It is expected that our method can be used to reduce the damage caused by Hive ransomware.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源