Cryakl

Compare

View crypto

Description

also known as “Fantomas”.
Cryakl first appeared in 2014, spreading primarily across Eastern Europe and Russia via phishing emails with malicious attachments. It uses an asymmetric RSA-based encryption scheme, appending victim-specific IDs and contact emails into filenames and ransom notes. The ransomware operates under a RaaS-like model, distributing builds to affiliates for broader dissemination. In 2018, Belgian law enforcement seized Cryakl’s command-and-control infrastructure and recovered decryption keys, enabling victims to restore files via free tools like Kaspersky’s RakhniDecryptor and the NoMoreRansom project.

External Analysis4
External Analysis
https://www.pcrisk.com/removal-guides/11220-cryakl-ransomware
https://securelist.com/the-return-of-fantomas-or-how-we-deciphered-cryakl/86511
https://www.bleepingcomputer.com/news/security/free-decryption-tool-released-for-cryakl-ransomware/
https://www.digital.nhs.uk/cyber-alerts/2018/cc-2542
Mail3
Mail
ivanivanov34@aol.com
abu.khan@india.com
cryptedencoder@aol.com
Note