Depending on the Phobos variant, there are different types of decryptors. Phobos ransomware is based on a 2-way decryption process. You will receive a decryptor executable, mostly called “decryptor.exe”, which first is used to scan the entire computer, network drives, external HDDs and other removable devices. After this scan has finished, you get a “Request code”, this contains the public key request, and it is completely individual for each victim.

This “Request code” is sent over to the attackers, who then generate your decryption keys. The keys generated are unique for each person. A decryption key which you get from another victim, who has already received a Phobos decryption key, will not work for you.

Comment on this FAQ

Your email address will not be published. Required fields are marked *

Post comment