News Akira ransomware cracked with RTX 4090 — new exploit to brute-force encryption attack

So now ransomware attackers can make more money by running a renting service of servers for ransomware decryption...
Why can't the OS detect the chacha8 and Kcipher2 encryption methods running at real time? It's about time to put the AI Copilot for a good use...
 
I have a question about cracking encryption... If you already know what is inside the file, shouldn't that make it much easier to crack encryption? Say you know that there is an exact file this large that looks exactly like this, should that not inform the encryption cracking?
 
I have a question about cracking encryption... If you already know what is inside the file, shouldn't that make it much easier to crack encryption? Say you know that there is an exact file this large that looks exactly like this, should that not inform the encryption cracking?
That's not how it works, that's not how any of this works. But at least username checks out.
 
I have a question about cracking encryption... If you already know what is inside the file, shouldn't that make it much easier to crack encryption? Say you know that there is an exact file this large that looks exactly like this, should that not inform the encryption cracking?
Does knowing what's inside a house make it easier for you to go through the door?
It's all about the lock
 
Can't wait for all the shenanigans when Banks make the switch to digital currencies. That ought to be fun.
Currencies have been digital for over half a century when SWIFT replaced TELEXed transfer orders. Did you think COBOL was just invented for fun?
Currencies have been digital for a long, long time, and they were ephemeral long before even that (when currencies ceased to be asset-backed and transitioned to economy-backed AKA 'fiat'), and large fund transfers (e.g. wire transfers) were so even before that.
Use of a distributed ledger rather than a centralised ledger isn't even a major distinction, as there are plenty of distributed ledger systems already in active use for inter-bank payments (e.g. Spunta Banka DLT).
 
  • Like
Reactions: artk2219
That's not how it works, that's not how any of this works. But at least username checks out.
It was how people were able to hack into encrypted PDFs in the past as I recall. If they could provide accurate information to the cracker as to what was inside, "exact quotes" from it, it gave them the ability to crack it faster, since they had something to compare the data to to validate keys.
 
If you store your data in the Cloud using something like Dropbox it maintains a Version history and you can get your stuff back without any problems at all.

So if you get ransomwared all you have to do is reinstall your OS.
 
It was how people were able to hack into encrypted PDFs in the past as I recall. If they could provide accurate information to the cracker as to what was inside, "exact quotes" from it, it gave them the ability to crack it faster, since they had something to compare the data to to validate keys.
That's how Enigma was decrypted during WW2 by the Allies, known message fragments.
 
That's not how it works, that's not how any of this works. But at least username checks out.
Does knowing what's inside a house make it easier for you to go through the door?
It's all about the lock
https://en.m.wikipedia.org/wiki/Known-plaintext_attack

I have no idea how effective that sort of attack would be on the ciphers used by this ransomware. But having access to both plaintext and ciphertext of the same data is something that can be useful in attacking encryption.
 
This really makes me wonder if this could be a business and hah I bet some blockchain will pop up claiming to match rtx video card owners with victims to give them free Ransome ware support and they then buy back coins and it's cheaper than paying lol that would be a nice free volunteer like service tho token or not. I would donate to someone who had video cards tho. Even if it meant not paying the drummer many people would pay same or more to cracker whote hat hacker on principle hah