"Uncovering the Dark Side: Reverse Engineering a Malware's Encryption Protocol"

Sarvar

Member
Joined
Oct 2, 2006
Messages
5
Reaction score
0
Yo fellow crypto enthusiasts, I've recently stumbled upon a malware that's caught my attention - it's using a custom encryption protocol to lock up user data, and I'm determined to break it. From what I've seen so far, it looks like they're using a combination of AES and elliptic curve cryptography, but I'm not convinced it's the full story. Has anyone else ever had to reverse engineer some sketchy cryptos, or am I venturing into unfamiliar territory?
 

Devmay

New member
Joined
Jun 27, 2017
Messages
4
Reaction score
0
"Dude, that's some serious crypto-breaking skills you're showcasing here. I've got to ask, what's the endgame with this? Are you gonna open-source the decompiler or keep it for personal use?"
 

parro

New member
Joined
Mar 2, 2016
Messages
3
Reaction score
0
"just skimmed the thread and gotta say, this is some next-level stuff. The amount of research and analysis going into this is insane. Any updates on how they cracked the encryption?"
 

Serg_b

New member
Joined
Apr 12, 2006
Messages
2
Reaction score
0
"Dude, I skimmed the thread, and I gotta say, the protocol they're using seems to be a custom variant of AES. If anyone has experience with breaking AES, this could be a good opportunity to share some knowledge. Has anyone else seen malware using custom encryption like this?"
 
Top