Researchers have released free tools that allow victims of the Bart and PowerWare file-encrypting ransomware families to recover their data without paying the cybercriminals.
PowerWare, which can be considered a successor of PoshCoder, emerged in March when it was spotted targeting healthcare organizations. An analysis conducted at the time revealed that victims using security products that capture traffic might be able to recover their files since the malware sent the encryption key in plain text back to its server.
Researchers at Palo Alto Networks have recently come across a variant of PowerWare that claims to be the Locky ransomware – it uses the .locky extension for encrypted files, the ransom note is identical, and the file recovery website references Locky.
Experts from Palo Alto Networks noticed that this PowerWare variant uses a static encryption key and it actually only encrypts the first 2048 bytes of each file. This has allowed the security firm to release a decryption script that searches the infected system for .locky files and restores them to their original state.
On Tuesday, antivirus company AVG announced that it has found a way to recover files encrypted by Bart ransomware, which is similar to Locky, but it doesn’t require a command and control (C&C) server to take files hostage.
Bart is designed to use password-protected ZIP archives to encrypt files with the extension .bart.zip. The Bart decryption tool uses a library called PkCrack to conduct a known plaintext attack that helps break the cipher. For AVG’s tool to work, victims must provide an encrypted file and a copy of the original file.
Obtaining a copy of an original file is not difficult. Users can select a file that was backed up or one that was sent to them via email. Another option is to simply download a standard Windows audio or image file from the Web and add it to the decryption tool along with the encrypted version.
Researchers have managed to create decryption tools for several pieces of ransomware, either because the encryption mechanism contained flaws or because cybercriminals had a change of heart and decided to publish the decryption keys. The list of ransomware families for which experts released recovery tools includes Locker, CryptXXX, Jigsaw, TeslaCrypt, Petya, Linux.Encoder, Coinvault, Radamant, CryptInfinite and Bitcryptor.
Related: Ransomware Operators Show Reputable “Customer” Service
Related: Locky Ransomware Gets Offline Encryption Capabilities

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Google Patches Third Chrome Zero-Day of 2023
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
Latest News
- Consolidate Vendors and Products for Better Security
- Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
