Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 18, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 18, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 18, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 18, 2025

      I need to see more from Lenovo’s most affordable gaming desktop, because this isn’t good enough

      May 18, 2025

      Gears of War: Reloaded — Release date, price, and everything you need to know

      May 18, 2025

      I’ve been using the Logitech MX Master 3S’ gaming-influenced alternative, and it could be your next mouse

      May 18, 2025

      Your Android devices are getting several upgrades for free – including a big one for Auto

      May 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      YTConverter™ lets you download YouTube videos/audio cleanly via terminal — especially great for Termux users.

      May 18, 2025
      Recent

      YTConverter™ lets you download YouTube videos/audio cleanly via terminal — especially great for Termux users.

      May 18, 2025

      NodeSource N|Solid Runtime Release – May 2025: Performance, Stability & the Final Update for v18

      May 17, 2025

      Big Changes at Meteor Software: Our Next Chapter

      May 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I need to see more from Lenovo’s most affordable gaming desktop, because this isn’t good enough

      May 18, 2025
      Recent

      I need to see more from Lenovo’s most affordable gaming desktop, because this isn’t good enough

      May 18, 2025

      Gears of War: Reloaded — Release date, price, and everything you need to know

      May 18, 2025

      I’ve been using the Logitech MX Master 3S’ gaming-influenced alternative, and it could be your next mouse

      May 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Researchers Crack DoNex Ransomware Encryption with Flaw in Cryptographic Schema

    Researchers Crack DoNex Ransomware Encryption with Flaw in Cryptographic Schema

    July 9, 2024

    Researchers have discovered a critical flaw in the cryptographic schema of the DoNex ransomware and all of its variants and predecessors. Since then, they have collaborated with law enforcement agencies to discreetly provide a decryptor to affected DoNex victims since March 2024.

    The cryptographic vulnerability was publicly discussed at Recon 2024, prompting the researchers to officially disclose details of the flaw and its implications.

    DoNex Ransomware Operations

    Avast researchers noted that the DoNex ransomware has undergone several rebrandings after initially identifying as Muse in April 2022. Subsequent iterations of DoNex included a rebrand to a purported Fake LockBit 3.0 in November 2022, then to DarkRace in May 2023, and finally to DoNex in March 2024. Since April 2024, the researchers noted that no newer samples were detected, and that the ransomware group’s official TOR address remained inactive, suggesting that DoNex may have ceased its evolution and rebranding attempts.

    DoNex ransomware employs a complex encryption process. During its execution, an encryption key is generated using the CryptGenRandom function. This key initializes a ChaCha20 symmetric key, which is then used to encrypt files.

    After encryption, the symmetric key is encrypted with RSA-4096 and appended to the affected file. For files up to 1 MB, the entire file is encrypted, while larger files are encrypted in segments of blocks. The ransomware’s configuration, along with details over whitelisted extensions, files, and services to terminate, are stored in an XOR-encrypted configuration file.

    While the researchers have not detailed the exact process they used to decipher the decryption, more details related to the same cryptographic vulnerability are available from files related to the Recon 2024 event talk titled “Cryptography is hard: Breaking the DoNex ransomware.” Gijs Rijnders, a malware reverse engineer and cyber threat intelligence analyst working for the Dutch National Police, hosted the talk.

    DoNex decryptor used by Dutch National Police, different from Avast version. (Source: cfp.recon.cx)

    DoNex primarily targeted victims in the US, Italy, and Belgium, using focused attacks. The researchers confirmed that all variants of the DoNex ransomware along with its earlier versions can be decrypted using the released DoNex decryptor.

     

     

    (Source: decoded.avast.io)

    Identifying DoNex Ransomware and Decryption

    Victims of the DoNex ransomware can recognize an attack through the ransom note left by the malware. Although different variants (Fake LockBit, DarkRace and DoNex) of DoNex produce distinct ransom notes, they share a similar layout.

    Avast version of DoNex decryptor (Source: decoded.avast.io)

    The researchers have shared instructions for using their decryptor against DoNex ransomware encrypted files:

    Download the provided decyptor. (The researchers recommend running the 64-bit version of the program due to memory requirements.)
    Run the decryptor’s executable file as an administrator. The program should run as a wizard, automatically guiding you through the decryption process.
    While the program lists all local drives by default, the user is requested to provide a list of possible locations meant to be decrypted.
    Users are then requested to provide an encrypted file (from any variant of DoNex) as well as a copy of the original file before encryption. The researchers emphasize selecting the biggest possible pair of files for this process.
     The next process of the wizard will begin the password cracking process. The researchers state that while this process of cracking only takes a second, it would require a huge volume of memory. After the step has been completed, users can get ready to begin with the decryption process for all the files on their entire system.
    In the final step, users can opt to back up encrypted files on their system, which may help in the event of failures during the decryption process. The researchers stated that the option is set at default.
    Users can let the program run in an attempt to decrypt all the DoNex encrypted files on their system.

    The researchers have also shared Indicators of compromise (IOCs) of the FakeLockBit 3.0, Dark Race and DoNex variants of the ransomware.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleTrojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories
    Next Article Community News: Latest PECL Releases (07.09.2024)

    Related Posts

    Development

    February 2025 Baseline monthly digest

    May 18, 2025
    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    May 18, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    PowerToys just got even more powerful with the addition of this new utility

    News & Updates

    The Weather Company enhances MLOps with Amazon SageMaker, AWS CloudFormation, and Amazon CloudWatch

    Development

    Meet GPUDeploy.com: An AI Startup that Provides a Marketplace for Renting GPUs

    Development

    Converting Laravel Models to JSON for API Responses

    Development

    Highlights

    Development

    Inclusive Tech: Hardware Accessibility Testing and Section 508

    May 16, 2024

    Table of Contents What is Hardware Accessibility Testing? Why Hardware Accessibility Testing Matters? Understanding Section 508 Requirements Hardware Accessibility Testing Methods How Can Tx help with Hardware Accessibility Testing? Summary In today’s digital era, tech innovations are major in scaling business operations. From smartphones to smart homes, reliance on technology is increasing daily. However, as … Continue reading “Inclusive Tech: Hardware Accessibility Testing and Section 508”
    The post Inclusive Tech: Hardware Accessibility Testing and Section 508 first appeared on TestingXperts.

    Using certifications to level up your development career

    November 6, 2024

    CVE-2025-21469 – Apache HTTP Server Memory Corruption

    May 6, 2025

    Laravel Live Denmark 2025

    February 11, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.