Emsisoft releases new decryptor for Ziggy ransomware

Ziggy Decryptor

We just released a new free decryption tool for Ziggy ransomware.  

If you have been infected with this ransomware, please download the free decryption tool linked below and DO NOT PAY the ransom. A detailed guide is also included. 

Download the Ziggy decryptor here. 

Ziggy announces retirement 

In early February 2021, the Ziggy group announced via Telegram that they would be shutting down their ransomware operation and releasing victims’ decryption keys.  

The group’s early retirement was apparently motivated by guilt and fear of legal repercussion. Speaking with BleepingComputer, an administrator for the Ziggy group said that they felt guilty about their actions and expressed concerns over global law enforcement efforts, which recently saw charges brought against Emotet and Netwalker affiliates. 

Following the announcement, the Ziggy ransomware admin released an SQL file containing 922 decryption keys, 340 of which are unique IDs. We can confirm that the keys are legitimate.  

Emsisoft releases Ziggy decryption tool 

The admin also released a decryptor that victims of Ziggy can use with the decryption keys listed in the SQL file. However, the decryptor is cumbersome to use and crashes frequently. We strongly recommend that victims use our decryptor instead of the attacker-provided decryptor. 

The Emsisoft decryptor is simple to use and requires just one encrypted file and an Internet connection. The decryptor then pulls decryption keys from our server based on the victim’s ID, and also the offline keys. Victim IDs are based on the volume serial of the C: drive of the infected machine.  

Download the Emsisoft Ziggy decryptor here.

ziggy_decryptor

Emsisoft decryptor for Ziggy ransomware.

Technical details 

Ziggy is a strain of ransomware that encrypts a victim’s files and demands a ransom payment to restore access. It primarily targets businesses and has impacted at least 340 unique victims since it was first observed in November 2020.  

Encrypted files are appended with the .ziggy extension, and a ransom note containing communication and payment instructions is displayed on the victim’s desktop. 

Ransom note sample:  

Ziggy ransom note.

Ziggy ransom note.

All your files have been encrypted!

Ziggy Ransomware 

All your files have been encrypted due to a security problem with your PC. If you want to restore them, write us to the e-mail: [REDACTED]

Write this ID in the title of your message : [REDACTED]

In case of no answer in 12 hours write us to this e-mail: [REDACTED]

You have to pay for decryption in Bitcoins. The price depends on how fast you write to us. After payment we will send you the tool that will decrypt all your files.

Free decryption as guarantee

Before paying you can send us up to 5 files for free decryption. The total size of files must be less than 4Mb (non archived), and files should not contain valuable information. (databases,backups, large excel sheets, etc.)

How to obtain Bitcoins

The easiest way to buy bitcoins is LocalBitcoins site. You have to register, click ‘Buy bitcoins’, and select the seller by payment method and price.

https://localbitcoins.com/buy_bitcoins

Also you can find other places to buy Bitcoins and beginners guide here:

http://www.coindesk.com/information/how-can-i-buy-bitcoins/

Attention!

# Do not rename encrypted files.

# Do not try to decrypt your data using third party software, it may cause permanent data loss.

# Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

 

Protect your device with Emsisoft Anti-Malware.

Did your antivirus let you down? We won’t. Download your free trial of Emsisoft Anti-Malware and see for yourself. Start free trial

 

Emsisoft Malware Lab

Emsisoft Malware Lab

The Lab team is a group of cybersecurity researchers whose mission is to enhance protection in Emsisoft products, help organizations respond to security incidents and create analysis that helps decision-makers understand the threat landscape.

What to read next

Reader Comments