Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      Handling JavaScript Event Listeners With Parameters

      July 21, 2025

      I finally gave NotebookLM my full attention – and it really is a total game changer

      July 22, 2025

      Google Chrome for iOS now lets you switch between personal and work accounts

      July 22, 2025

      How the Trump administration changed AI: A timeline

      July 22, 2025

      Download your photos before AT&T shuts down its cloud storage service permanently

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel Live Denmark

      July 22, 2025
      Recent

      Laravel Live Denmark

      July 22, 2025

      The July 2025 Laravel Worldwide Meetup is Today

      July 22, 2025

      Livewire Security Vulnerability

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
      Recent

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025

      Halo and Half-Life combine in wild new mod, bringing two of my favorite games together in one — here’s how to play, and how it works

      July 22, 2025

      Surprise! The iconic Roblox ‘oof’ sound is back — the beloved meme makes “a comeback so good it hurts” after three years of licensing issues

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Japanese Police Release Free Decryption Tool for Phobos and 8Base Ransomware Victims

    Japanese Police Release Free Decryption Tool for Phobos and 8Base Ransomware Victims

    July 21, 2025

    Japanese Police

    To fight against cybercrime, Japan’s National Police Agency (NPA) has released a free decryption tool for victims of the Phobos and 8Base ransomware variants. The decryptor, made publicly available in collaboration with international law enforcement agencies, aims to assist thousands of organizations worldwide that have suffered from ransomware attacks since 2019.

    The Japanese police revealed decryption utility along with an English-language user guide, offering relief to affected organizations across multiple sectors.

    The initiative follows extensive international cooperation involving the European Cybercrime Centre (Europol), the FBI, and law enforcement agencies in the U.S., Germany, South Korea, France, and Thailand.

    The FBI’s Baltimore field office led the investigation, which earlier this year resulted in the takedown of key elements of the Phobos ransomware infrastructure and criminal charges against several alleged affiliates.

    free decryption tool
    Source: X

    Background on Phobos and 8Base Ransomware

    Phobos ransomware first emerged in 2019 and is known for targeting small to mid-sized organizations, demanding relatively modest ransom payments, many under $100,000. According to U.S. prosecutors, Phobos operators and affiliates have collectively extorted more than $16 million from over 1,000 victims globally.

    The 8Base ransomware group, which emerged as a spinoff in mid-2023, leveraged Phobos’s infrastructure to develop its own variant. Europol previously stated that 8Base tailored attacks for maximum impact using Phobos’s encryption and delivery mechanisms. The group has been particularly aggressive with its double extortion tactics, encrypting victims’ data and threatening to publish the stolen files unless a ransom was paid.

    Notable targets of 8Base include:

    • The United Nations Development Programme
    • The Atlantic States Marine Fisheries Commission

    Critical Infrastructure Among the Victims

    U.S. authorities warned earlier this year that Phobos and its variants had affected state, local, tribal, and territorial government entities. The targets included public healthcare services, emergency services, education systems, and law enforcement. The damages amounted to millions of dollars in ransom payments and disrupted operations.

    Victim examples from court documents include:

    • California public school system – Paid $300,000 (Summer 2023)
    • Maryland accounting firm for federal agencies – Paid $12,000 (Early 2021)
    • Pennsylvania healthcare organization – Paid $20,000 (Spring 2022)
    • Maryland healthcare groups – Paid $25,000 and $37,000 (Summer 2022)
    • North Carolina children’s hospital – Paid $100,000 (Fall 2023)
    • Other victims include contractors for the U.S. Department of Defense and Energy, public school systems in Connecticut, a New York law enforcement union, and a federally recognized tribe.

    Law Enforcement Hits Back

    The global investigation culminated in several high-profile arrests:

    • Evgenii Ptitsyn, an alleged administrator of Phobos, was extradited from South Korea in November.
    • Another suspect was arrested in Italy after an international arrest warrant was issued by French authorities.
    • A Thai police operation dubbed “PHOBOS AETOR” led to the arrest of four individuals—two men and two women—in Phuket.

    The U.S. Department of Justice later break open charges against Roman Berezhnoy (33) and Egor Nikolaevich Glebov (39), who are accused of using the Phobos ransomware to generate over $16 million in illicit revenue. According to the indictment, the duo profited by distributing Phobos code to affiliates on the dark web. When victims paid for decryption, affiliates shared a portion—often $300—with the administrators. Prosecutors confirmed that Ptitsyn controlled the main cryptocurrency wallet used to collect these fees.

    In tandem with the arrests, law enforcement agencies dismantled over 100 servers used in the ransomware operations and issued alerts to more than 400 companies that were either under threat or already compromised.

    How to Use the Free Decryption Tool

    The decryption tool, named “PhDec Decryptor,” is available for free download via the No More Ransom portal (https://www.nomoreransom.org). The software can decrypt a wide range of files encrypted by Phobos or 8Base ransomware variants.

    Supported File Extensions:

    • .phobos
    • .8base
    • .elbie
    • .faust
    • .LIZARD
    • Additional extensions matching the naming convention {Original Filename}.id[{8 random characters}–{4 digit numbers}].[{Mail address}].{File Extensions}

    Note: Decryption may not be successful if the files were corrupted during the encryption process or if encryption keys were broken.

    Step-by-Step Guide to Use Decryption Tool

    1. Download & Run the Tool:
      • Download from No More Ransom and execute the .exe file.
      • Users may need to override antivirus warnings.
    2. Agree to Terms of Service:
      • Review and accept terms before proceeding.
    3. Select Files or Folder:
      • Choose a single file or entire folders for decryption.
      • Drag-and-drop functionality is supported.
    4. Set Output Directory:
      • Specify where decrypted files should be saved.
    5. Start Decryption:
      • Press [Decrypt] to initiate the process.
    6. Check Results:
      • On completion, a message confirms success.
      • Results include the number of successfully decrypted, failed, and unsupported files.

    Output reports are generated in .txt, .csv, and .log formats to provide detailed feedback on the decryption process.

    Conclusion

    As ransomware continues to evolve, coordinated law enforcement action and accessible resources like this tool offer a lifeline to organizations hit by such debilitating attacks. Victims are encouraged to avoid paying ransoms, use the free decryptor, and report incidents to local and international cybersecurity authorities.

    Caution for Victims: While the decryptor offers hope, the Japanese NPA cautions that it does not guarantee the integrity of all decrypted files, especially if the original encryption was flawed or if the files were altered post-attack.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticlePoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse
    Next Article Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks

    Related Posts

    Development

    Laravel Live Denmark

    July 22, 2025
    Development

    The July 2025 Laravel Worldwide Meetup is Today

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Stop buying Steam games that are already on Game Pass — I found an extension that does the work for you

    News & Updates

    CVE-2025-7133 – CodeAstro Online Movie Ticket Booking System Cross-Site Request Forgery Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-40653 – M3M Printer Server Web User Enumeration Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-53359 – Ethereum Crate Signature Malleability Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Development

    What Are JSON Web Tokens (JWT)?

    July 8, 2025

    When you’re working with any website, application, or API, you’ll inevitably need to log in…

    CVE-2025-4583 – Smash Balloon Social Photo Feed – Easy Social Feeds Plugin Stored Cross-Site Scripting (XSS)

    May 29, 2025

    Bungie’s Marathon delayed past September release date as a darker tone, proximity chat, and more are being added

    June 17, 2025

    CISA Warns Critical Flaws in KUNBUS Revolution Pi Exposing Industrial Systems to Remote Attacks

    May 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.