A newly discovered variant of the Linux.Encoder ransomware is currently making headlines as it targets vulnerable servers across the globe, with over 600 infections reported to date. Fortunately for the affected users, researchers at Bitdefender have indicated that files can still be decrypted at no cost, offering a silver lining amidst the chaos.
The ransomware first caught the attention of security experts in November of last year when it began infiltrating Linux web servers. Initial responses were swift; Bitdefender analysts managed to exploit a programming flaw that unveiled the decryption key, providing victims with a free utility for file recovery. Following this discovery, it became evident that an earlier version of the malware was susceptible to similar vulnerabilities, allowing for successful decryption methods.
“In the current version of the Linux.Encoder ransomware, every file that goes through the encryption process is given the modification time of the original, unencrypted file,” said Bogdan Botezatu, a cybersecurity expert. This means if a file from 2012 is encrypted today, it would still appear to have been last modified in 2012, complicating decryption efforts based on modification times.

In the previous iterations, the ransomware generated an initialization vector and an AES key using the rand() function, which relied on the current timestamp as its random seed. This method proved inadequate. In response to feedback, many users ridiculed their approach, suggesting, “srand(time()) is not cryptographically secure! You need to do srand(md5(time())).” The creators have seemingly taken these insights to heart, upgrading their malware to incorporate changes designed to thwart the decryption methods exploited by researchers.
Despite these enhancements, flaws still remain in the ransomware's functionality. The new Linux.Encoder variant does not link statically to the libc library, making it incompatible with older systems that are often easier targets. However, perhaps the most critical oversight lies within their key generation process.
"The breaking flaw shipped with the Linux.Encoder ransomware resides in the way the attackers are hashing the random bytes to produce the AES-256 key,” Botezatu explained. “They have completely forgotten to select a hashing algorithm, so the output of the hashing function is unchanged.” This crucial misstep means that the AES key is written directly into the encrypted files, leading to a simplified recovery process for victims.
Victims affected by the latest iteration will find relief in Bitdefender's decryption utility. “If you have been hit by the new version of this ransomware and would like to get your files back for free, head over to the download section and run the decryption utility provided by Bitdefender,” Botezatu advised. This utility marks yet another successful recovery effort against ransomware, demonstrating the ongoing battle between cybercriminals and cybersecurity experts.

Looking Ahead
While this is the third known version of the ransomware to fall short against decryption tactics, experts warn that hackers may refine their methods in the future. Organizations are urged to update their vulnerable platforms immediately following data recovery to prevent vulnerabilities from being exploited in subsequent attacks.
The consistency of vulnerabilities found in these ransomware variants highlights an ongoing challenge in the cybersecurity landscape. With each iteration, there is a chance for improvements, but also a risk of a more sophisticated attack. Organizations must remain vigilant and proactive in ensuring that their systems are fortified against these evolving threats.

