Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Fonix Ransomware Operators Close Shop, Release Decryption Keys

The cybercriminals behind the Fonix ransomware have announced plans to shut down their activity, and have already released the master decryption key for the malware.

The cybercriminals behind the Fonix ransomware have announced plans to shut down their activity, and have already released the master decryption key for the malware.

Also known as FonixCrypter and Xonif, the ransomware has been operating since June 2020, with several variants observed since. The ransomware would add the .FONIX, .XINOF, .Fonix, or .repter extensions to the encrypted files.

“You know about Fonix team but we have come to the conclusion. We should use our abilities in positive ways and help others. […] Anyway now main admin has decided to put all previous work aside and decrypt all infected systems at no cost. And the decryption key will be available to the public,” the cyber-group announced on Twitter.

In the shutdown announcement, the operators also said that the ransomware’s source code was deleted, but warned that some people involved in the project might attempt to scam others by selling them fake code.

In a separate message on the social platform, the group published a link to the master RSA key needed to restore encrypted files, as well as to a sample decryptor, which victims can use to recover their files without having to pay a ransom.

They also announced that victims can send emails to XINOF [@] cock.li to have their files decrypted for free. Furthermore, the Fonix operators offered to help security researchers create decryption tools for the ransomware.

According to its operators, the Fonix project was launched due to their poor financial situation, and the shutdown would help the developers stop feeling guilty.

While the group did not make it clear what influenced the decision to close the operation, it should be noted that other ransomware operators made similar moves in the past, including those behind GandCrab, Shade, and TeslaCrypt.

Fonix’ shutdown announcement was made the same week law enforcement revealed the infrastructure behind the massive Emotet botnet was disrupted and taken over by authorities, with a cleanup operation set to begin within the next few months.

Related: Packaging Giant WestRock Says Ransomware Attack Impacted OT Systems

Related: Ransomware Attacks Linked to Chinese Cyberspies

Related: Industrial Control Systems Ripe Targets for Ransomware Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...

Cybercrime

Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack