Description

Japanese officials issued a decryptor tool free of charge that allows victims to decrypt files encrypted by the Phobos and 8Base ransomware groups, a windfall for ransomware sufferers. As a ransomware-as-a-service campaign since 2018, Phobos facilitated it for its affiliates to conduct attacks across the globe. Using a diluted copy of the Phobos encryptor and double extortion tactics, encrypting data and threatening to leak stolen information, the 8Base campaign was launched in 2023 by a splinter faction. The group was severely hampered in 2024 when a purported Russian Phobos admin was extradited from Russia to the US, four 8Base commanders were caught, and 27 associated servers went dark. Data collected during such joint police exercises is said to have been used to develop the recently released decryptor. Files containing encryption extensions like ".phobos", ".8base", ".elbie", ".faust", and ".LIZARD" can be recovered using the software available for download from the website of the Japanese police and endorsed by Europol and the FBI. BleepingComputer tests, which include full decrypt of files encrypted by newer variants like LIZARD, validate the security and usability of the file even when it is identified as malicious by some browsers. Users and organizations are advised to routinely backup important data, address vulnerabilities as quickly as possible, and teach users against phishing and social engineering tactics not to become victims of future attacks. Endpoint detection products must be remembered by cybersecurity teams and threat intelligence updated. Phobos or 8Base attackers, even with alternate fileextensions, are highly advised to attempt the decryptor as it may work despite this.