Category - Egregor

Egregor ransomware encrypts business users’ data with AES+RSA and then requires contact within 3 days for a Bitcoins ransom to get the files back. Distributers Egregor threatens to publish the stolen data in order to increase pressure on the victim. To do this, ransomware operators begin to steal data even before encrypting files. In some info, we know that Maze operators switched to Egregor.

Maze, Egregor ransomware decryption keys released by the developer

On February 9, 2022, amazing news appeared for the victims of Maze, Sekhmet and Egregor ransomware. The master decryption key was released by the developer of both malicious groups, which changed each other through time. About Maze and Egregor ransomware Maze ransomware appeared in 2019 and turned out to be a trendsetter in the ransomware world. While LockBit ransomware, which appeared around the same time, was standing on their honesty, Maze was boasting of high profitability. This ransomware group was the first who applied the double extortion technique – a usual thing for all other...

Maze and Egregor ransomware operators earned more than $75 million in bitcoins

Analyst1 security researchers have calculated that the hackers behind the Maze and Egregor ransomware have already earned more than $75 million in ransoms from their victims. The company’s data is based on transactions that researchers were able to trace on public blockchains. , the experts’ conclusions are fully consistent with a similar report from Chainalysis, whose analysts believe that Maze ransomware is the third most profitable after Ryuk and Doppelpaymer. The hack group Maze firstly became famous in May 2019, offering other cybercriminals malware using the RaaS (Ransomware...