Z

Guides & Newsletters

Grab our growing library of business-related technical resources.



Tech Tuesday

We'll be bringing you new and fascinating information every Tuesday in 2021. Don't miss an episode!



Contact Us

Get in touch with us now.



Log in to Support

Log in to the Support Portal

Open a Support Ticket

Open a Support Ticket and get help.

Connecting to Support

Get help connecting to our remote support tool.

Have You Been Pwned?

Have your passwords been compromised?

Niagara Network and IT Support Logo
  • What’s New
  • About Us
    • We are Hiring
    • FAQs
    • Business Partners
  • Niagara Region
    • IT Services and Computer Repair in Welland
    • Computer Services for St Catharines
    • Computer Repair in St Catharines
    • IT Support in Port Colborne
    • Non-Profit Computer Support
  • Computer Service
    • On Demand Managed Services
    • Niagara UnManaged/On Demand IT Support
    • Office 365
      • Mailboxes, Aliases, Shared Mailboxes, Groups
    • Internet Services
      • Create Your Online Store
      • Web Site Repair
      • Power Hosting
  • Phone Systems
  • Support
Schedule a Chat

Free decryption tools now available for Dharma ransomware

Computer users who have been affected by the Dharma ransomware and have held onto their encrypted files can now restore them for free. Researchers have created decryption tools for this ransomware strain after someone recently leaked the decryption keys.

Dharma first appeared in November and is based on an older ransomware program known as Crysis. It’s easy to recognize files affected by it because they will have the extension: .[email_address].dharma, where the email address is the one used by the attacker as a point of contact.

On Wednesday, a user named gektar published a link to a Pastebin post on the BleepingComputer.com technical support forum. The post, he claimed, contained the decryption keys for all Dharma variants.

Interestingly, the exact same thing happened back in November with the keys for Crysis, Dharma’s predecessor, allowing researchers to create decryption tools for it.

It’s not clear who gektar is or what his or her reasons were for leaking the Dharma keys. The username appears to have been created on the forum just for this purpose and has had no other activity since then.

There’s also no information about how the keys were obtained in the first place. However, they were included in a C header file, which could suggest that the leaker had access to the ransomware program’s source code.

The good news is that the leaked keys are real, and researchers from Kaspersky Lab and ESET verified they work. The two companies have updated their Crysis decryption tools — downloads at Kaspersky RakhniDecryptor and ESET CrysisDecryptor — to work for Dharma affected files, too.

This should serve as a reminder to ransomware victims to keep a copy of their affected files, even if they decide not to give into attackers’ ransom demands. Researchers sometimes find flaws in the encryption implementations of ransomware programs that allow them to break the encryption keys. Other times law enforcement authorities seize command-and-control servers used by ransomware gangs and release the decryption keys.

From time to time, like in this case, the keys find their way online due to unexplained leaks: Maybe a ransomware developer decides to close up shop and publish the keys, or maybe a hacker breaks into a rival gang’s servers and releases the keys to harm its operations. The point is: Hold onto those files, for months or even years if you need to.

It’s a good idea to check the tools section of the NoMoreRansom.org website regularly. The website is maintained by a coalition of security companies and law enforcement agencies and is frequently updated with new information and decryption tools.

blx4 #2005 blox4.html

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Source: Free decryption tools now available for Dharma ransomware

Niagara’s Tech Support Services

We approach IT with a simple principle – Keep IT Simple without scrimping on features. We’ve built a proven process that gets IT right every time. Like a Tim Hortons coffee or a MacDonald’s Big Mac. Give your staff the tools they need to succeed.

Enabling only the features you need on technology that grows with your business makes troubleshooting and maintenance a breeze. When you need a new feature, our technology isn’t crippled. We turn it on, document it, monitor it, and your business grows effortlessly.

Don’t leave a critical business component to chance. Talk to us today.

Confidential Information and Password Management Policy

What’s New

How concerned should you be about cyber attacks?

How concerned should you be about cyber attacks?

by Glen | May 5, 2025 | Tech News

« Older Entries

Follow Us

  • Follow
  • Follow

Address

38 Dorothy St.
Welland ON L3B 3V7

Email Us

info@bowesit.com

Call Us

(289) 479-5606