Japanese officials issued a decryptor tool free of charge that allows victims to decrypt files encrypted by the Phobos and 8Base ransomware groups, a windfall for ransomware sufferers. As a ransomware-as-a-service campaign since 2018, Phobos facilitated it for its affiliates to conduct attacks across the globe. Using a diluted copy of the Phobos encryptor and double extortion tactics, encrypting data and threatening to leak stolen information, the 8Base campaign was launched in 2023 by a splinter faction. The group was severely hampered in 2024 when a purported Russian Phobos admin was extradited from Russia to the US, four 8Base commanders were caught, and 27 associated servers went dark. Data collected during such joint police exercises is said to have been used to develop the recently released decryptor. Files containing encryption extensions like ".phobos", ".8base", ".elbie", ".faust", and ".LIZARD" can be recovered using the software available for download from the website of the Japanese police and endorsed by Europol and the FBI. BleepingComputer tests, which include full decrypt of files encrypted by newer variants like LIZARD, validate the security and usability of the file even when it is identified as malicious by some browsers. Users and organizations are advised to routinely backup important data, address vulnerabilities as quickly as possible, and teach users against phishing and social engineering tactics not to become victims of future attacks. Endpoint detection products must be remembered by cybersecurity teams and threat intelligence updated. Phobos or 8Base attackers, even with alternate fileextensions, are highly advised to attempt the decryptor as it may work despite this.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...