Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 18, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 18, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 18, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 18, 2025

      I need to see more from Lenovo’s most affordable gaming desktop, because this isn’t good enough

      May 18, 2025

      Gears of War: Reloaded — Release date, price, and everything you need to know

      May 18, 2025

      I’ve been using the Logitech MX Master 3S’ gaming-influenced alternative, and it could be your next mouse

      May 18, 2025

      Your Android devices are getting several upgrades for free – including a big one for Auto

      May 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      YTConverter™ lets you download YouTube videos/audio cleanly via terminal — especially great for Termux users.

      May 18, 2025
      Recent

      YTConverter™ lets you download YouTube videos/audio cleanly via terminal — especially great for Termux users.

      May 18, 2025

      NodeSource N|Solid Runtime Release – May 2025: Performance, Stability & the Final Update for v18

      May 17, 2025

      Big Changes at Meteor Software: Our Next Chapter

      May 17, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      I need to see more from Lenovo’s most affordable gaming desktop, because this isn’t good enough

      May 18, 2025
      Recent

      I need to see more from Lenovo’s most affordable gaming desktop, because this isn’t good enough

      May 18, 2025

      Gears of War: Reloaded — Release date, price, and everything you need to know

      May 18, 2025

      I’ve been using the Logitech MX Master 3S’ gaming-influenced alternative, and it could be your next mouse

      May 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Researchers Crack DoNex Ransomware Encryption with Flaw in Cryptographic Schema

    Researchers Crack DoNex Ransomware Encryption with Flaw in Cryptographic Schema

    July 9, 2024

    Researchers have discovered a critical flaw in the cryptographic schema of the DoNex ransomware and all of its variants and predecessors. Since then, they have collaborated with law enforcement agencies to discreetly provide a decryptor to affected DoNex victims since March 2024.

    The cryptographic vulnerability was publicly discussed at Recon 2024, prompting the researchers to officially disclose details of the flaw and its implications.

    DoNex Ransomware Operations

    Avast researchers noted that the DoNex ransomware has undergone several rebrandings after initially identifying as Muse in April 2022. Subsequent iterations of DoNex included a rebrand to a purported Fake LockBit 3.0 in November 2022, then to DarkRace in May 2023, and finally to DoNex in March 2024. Since April 2024, the researchers noted that no newer samples were detected, and that the ransomware group’s official TOR address remained inactive, suggesting that DoNex may have ceased its evolution and rebranding attempts.

    DoNex ransomware employs a complex encryption process. During its execution, an encryption key is generated using the CryptGenRandom function. This key initializes a ChaCha20 symmetric key, which is then used to encrypt files.

    After encryption, the symmetric key is encrypted with RSA-4096 and appended to the affected file. For files up to 1 MB, the entire file is encrypted, while larger files are encrypted in segments of blocks. The ransomware’s configuration, along with details over whitelisted extensions, files, and services to terminate, are stored in an XOR-encrypted configuration file.

    While the researchers have not detailed the exact process they used to decipher the decryption, more details related to the same cryptographic vulnerability are available from files related to the Recon 2024 event talk titled “Cryptography is hard: Breaking the DoNex ransomware.” Gijs Rijnders, a malware reverse engineer and cyber threat intelligence analyst working for the Dutch National Police, hosted the talk.

    DoNex decryptor used by Dutch National Police, different from Avast version. (Source: cfp.recon.cx)

    DoNex primarily targeted victims in the US, Italy, and Belgium, using focused attacks. The researchers confirmed that all variants of the DoNex ransomware along with its earlier versions can be decrypted using the released DoNex decryptor.

     

     

    (Source: decoded.avast.io)

    Identifying DoNex Ransomware and Decryption

    Victims of the DoNex ransomware can recognize an attack through the ransom note left by the malware. Although different variants (Fake LockBit, DarkRace and DoNex) of DoNex produce distinct ransom notes, they share a similar layout.

    Avast version of DoNex decryptor (Source: decoded.avast.io)

    The researchers have shared instructions for using their decryptor against DoNex ransomware encrypted files:

    Download the provided decyptor. (The researchers recommend running the 64-bit version of the program due to memory requirements.)
    Run the decryptor’s executable file as an administrator. The program should run as a wizard, automatically guiding you through the decryption process.
    While the program lists all local drives by default, the user is requested to provide a list of possible locations meant to be decrypted.
    Users are then requested to provide an encrypted file (from any variant of DoNex) as well as a copy of the original file before encryption. The researchers emphasize selecting the biggest possible pair of files for this process.
     The next process of the wizard will begin the password cracking process. The researchers state that while this process of cracking only takes a second, it would require a huge volume of memory. After the step has been completed, users can get ready to begin with the decryption process for all the files on their entire system.
    In the final step, users can opt to back up encrypted files on their system, which may help in the event of failures during the decryption process. The researchers stated that the option is set at default.
    Users can let the program run in an attempt to decrypt all the DoNex encrypted files on their system.

    The researchers have also shared Indicators of compromise (IOCs) of the FakeLockBit 3.0, Dark Race and DoNex variants of the ransomware.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleTrojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories
    Next Article Community News: Latest PECL Releases (07.09.2024)

    Related Posts

    Development

    February 2025 Baseline monthly digest

    May 18, 2025
    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    May 18, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2024-55569 – Samsung Exynos Out-of-Bounds Write Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Google: Zero-Day Exploits Shift from Browsers to Enterprise Security Tools in 2024

    Security

    Preparing for 2025: Microsoft’s Plan to Secure Digital Identities and Defend Against Emerging Cyber Attacks

    Development
    New method efficiently safeguards sensitive AI training data

    New method efficiently safeguards sensitive AI training data

    Artificial Intelligence

    Highlights

    Linux

    Akamai diventa il fornitore ufficiale dell’infrastruttura del kernel Linux

    April 14, 2025

    Akamai (Akamai Technologies, Inc.), nota azienda specializzata in reti per la distribuzione di contenuti (CDN)…

    dotswan/filament-laravel-pulse

    January 28, 2025

    Improve Amazon Timestream for InfluxDB security posture by automating rotation for long-lived credentials

    December 26, 2024

    Microsoft MSHTML Flaw Exploited to Deliver MerkSpy Spyware Tool

    July 3, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.