Cryakl

Description

also known as “Fantomas”.
Cryakl first appeared in 2014, spreading primarily across Eastern Europe and Russia via phishing emails with malicious attachments. It uses an asymmetric RSA-based encryption scheme, appending victim-specific IDs and contact emails into filenames and ransom notes. The ransomware operates under a RaaS-like model, distributing builds to affiliates for broader dissemination. In 2018, Belgian law enforcement seized Cryakl’s command-and-control infrastructure and recovered decryption keys, enabling victims to restore files via free tools like Kaspersky’s RakhniDecryptor and the NoMoreRansom project.

External Analysis
https://www.pcrisk.com/removal-guides/11220-cryakl-ransomware
https://securelist.com/the-return-of-fantomas-or-how-we-deciphered-cryakl/86511
https://www.bleepingcomputer.com/news/security/free-decryption-tool-released-for-cryakl-ransomware/
https://www.digital.nhs.uk/cyber-alerts/2018/cc-2542
Mail
ivanivanov34@aol.com
abu.khan@india.com
cryptedencoder@aol.com
Urls
Screen
File servers
Screen
Chat servers
Screen
Admin servers
Screen