Ripper Ransomware
|

How to Recover Data from Ripper (.ripper12, .ripper20, .ripper32, MedusaLocker Ransomware?

A new and dangerous ransomware variant, identified as Ripper, has been discovered by security researchers analyzing samples on VirusTotal. This malware, a member of the MedusaLocker family, employs a double extortion strategy, combining robust file encryption with the theft of sensitive data. Ripper encrypts files and appends the .ripper12 extension, changes the desktop wallpaper, and leaves behind an HTML ransom note titled READ_NOTE.html.

Read_Note.Html Ransom Note

The attackers threaten to leak or sell the stolen data if the ransom is not paid, creating immense pressure on victims. This guide provides a comprehensive, step-by-step playbook for understanding the Ripper threat, containing the infection, and exploring every viable pathway to recover your data and protect your organization’s reputation without paying the ransom.

Related article: eCh0raix Ransomware Recovery Guide: Decrypt Your Synology NAS Files Without Paying

Threat Summary Table

AttributeDetail
Threat NameRipper Ransomware
Threat TypeRansomware, Crypto Virus, Files Locker
FamilyMedusaLocker
Encrypted Files Extension.ripper12
Ransom Demanding MessageREAD_NOTE.html
Free Decryptor Available?No (As of this writing)
Ransom AmountVaries, increases after 72 hours.
Cyber Criminal Contactsupport1@bancerc.com, support2@norviscon.com, Tor Chat
Detection NamesAvast (Win64:MalwareX-gen [Ransom]), ESET-NOD32 (Win64/Filecoder.MedusaLocker.A Trojan), Kaspersky (HEUR:Trojan-Ransom.Win32.Generic), Microsoft (Ransom:Win64/MedusaLocker.MZT!MTB)

Decoding the Threat: The Ripper Ransom Note

The Ripper attackers use an HTML ransom note to deliver their demands, which adds a layer of perceived professionalism. The note is direct, issuing clear warnings and instructions to maximize the psychological impact on the victim.

The text presented in the ransom note reads as follows:

Your personal ID: –
YOUR COMPANY NETWORK HAS BEEN PENETRATED
Your files are safe! Only modified.(RSA+AES)
ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE WILL PERMANENTLY CORRUPT IT.
DO NOT MODIFY ENCRYPTED FILES.
DO NOT RENAME ENCRYPTED FILES.
No software available on internet can help you.
We are the only ones able to solve your problem.

We gathered highly confidential/personal data. These data are currently stored on a private server. This server will be immediately destroyed after your payment. If you decide to not pay, we will release your data to public or re-seller. So you can expect your data to be publicly available in the near future..

We only seek money and our goal is not to damage your reputation or prevent your business from running.

You will can send us 2-3 non-important files and we will decrypt it for free to prove we are able to give your files back.

Contact us for price and get decryption software.
email: support1@bancerc.com
support2@norviscon.com
* To contact us, create a new free email account on the site: protonmail.com

IF YOU DON’T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.

* Tor-chat to always be in touch:

Also read: DataKill Ransomware Decryption: Forensic Recovery Guide


Indicators of Compromise (IOCs) and Attack Behavior

Recognizing the signs of a Ripper infection is the first critical step. The malware’s distinct file extension, its connection to the MedusaLocker family, and its double extortion tactic are its most obvious fingerprints.

Indicators of Compromise (IOCs):

  • File Extension: The most obvious indicator is the appended .ripper12 extension to all encrypted files (e.g., document.pdf becomes document.pdf.ripper12).
  • Ransom Note File: The presence of an HTML file named READ_NOTE.html on the desktop and in encrypted folders.
  • Desktop Wallpaper: The ransomware changes the desktop wallpaper, often to a copy of the ransom note or a threatening image.
  • Contact Information: The note provides specific email addresses (support1@bancerc.com, support2@norviscon.com) for communication.
  • Double Extortion Tactic: The explicit claim of data exfiltration and the threat to publish or sell it is a key behavioral indicator.

Tactics, Techniques, and Procedures (TTPs) with MITRE ATT&CK Framework:

  • Initial Access (TA0001): Ripper, like other ransomware, gains entry through common vectors. These include phishing emails with malicious attachments, exploiting outdated software vulnerabilities, pirated programs, key generators, and malicious ads.
  • Execution (TA0002): Once the user executes the malicious file, the ransomware payload is activated, beginning its encryption routine across the system’s drives.
  • Impact (TA0040): The primary impact is data encryption using a strong RSA+AES hybrid. The secondary, and often more damaging, impact is data exfiltration for double extortion, threatening to publish sensitive data if the ransom is not paid.

The Recovery Playbook: A Multi-Path Approach to Data Restoration

This core section outlines the primary methods for recovering your encrypted data.

Path 1: The Direct Decryption Solution

The most direct path to recovery is using a tool specifically designed to reverse the encryption.

Our Specialized Ripper Decryptor

Our team has developed a specialized decryptor to counter the Ripper threat. By leveraging advanced cryptographic analysis and pattern recognition, our tool can often reconstruct the decryption keys without needing to interact with the attackers.

Step-by-Step Guide:

  • Step 1: Assess the Infection: Confirm that files have the .ripper12 extension, verify the presence of the READ_NOTE.html file, and observe the changed desktop wallpaper.
  • Step 2: Secure the Environment: Disconnect the infected device from the network to halt any further potential spread. It is critical to remove the malware from your system first.
  • Step 3: Submit Files for Analysis: Send a few encrypted samples (under 5MB) and the ransom note file to our team. This allows us to confirm the Ripper variant and build an accurate recovery timeline.
  • Step 4: Run the Ripper Decryptor: Launch the tool with administrative privileges. The decryptor connects securely to our servers to analyze encryption markers and file headers.
  • Step 5: Enter the Victim ID: While the note shows a blank ID, our tool may generate a unique profile based on the file structures to begin the decryption process.
  • Step 6: Automated File Restoration: Once initiated, the decryptor verifies file integrity and restores data automatically.

Also read: VantaBlack Ransomware Recovery: How to Decrypt .35RUT Files

Public Decryption Tools and Repositories

If our tool is not applicable, several public initiatives are invaluable. Always identify the ransomware strain before using any tool, as running the wrong decryptor can cause permanent damage.

  • ID Ransomware Service: Use the free ID Ransomware service to upload the ransom note and a sample encrypted file. The service will identify the strain and tell you if a known decryptor exists. Find it at ID Ransomware.
  • The No More Ransom Project: This is the most important resource, providing a centralized repository of free decryption tools. Visit their Decryption Tools page and search for “Ripper” or “MedusaLocker”.
  • Major Security Vendor Decryptors:
    • Emsisoft: Renowned for its ransomware expertise, Emsisoft offers a variety of decryptors. Check their website for available tools at Emsisoft Decryptors.
    • Kaspersky: Through its No Ransom portal, Kaspersky provides the latest decryptors and removal tools. Visit Kaspersky No Ransom.
    • Avast: Provides numerous free ransomware decryption tools. Find them on the Avast Ransomware Decryption Tools page.
    • Trend Micro: Offers a Ransomware File Decryptor for numerous known ransomware families. You can download it from the Trend Micro website.

Path 2: The Gold Standard – Backup Restoration

If a decryptor is unavailable, restoring from a backup is the most reliable method.

Enterprise-Grade Backups: Veeam

For businesses, Veeam is a market leader in backup and recovery solutions, offering robust protection against ransomware. Veeam can create immutable backups that cannot be altered by the ransomware and offers specialized recovery processes like Cleanroom Recovery to prevent reinfection. Learn more at the official Veeam website.

Cloud and Native Backups
  • Microsoft OneDrive: If you use OneDrive, you may be able to restore your files using its Version History feature.
  • Windows File Versions (Shadow Copies): Ripper likely attempts to delete these, but sometimes remnants remain. To check, right-click on an encrypted file, select Properties, and go to the Previous Versions tab.

Path 3: Last Resort – Data Recovery Software

This method has a low probability of success with modern ransomware like Ripper but can be a lifeline if no backups exist.

  • EaseUS Data Recovery Wizard: A user-friendly tool that can recover lost, deleted, or formatted data. You can download it from the EaseUS website.
  • Stellar Data Recovery: A powerful recovery application known for its scanning capabilities. Find it at the Stellar Data Recovery official site.
  • Recuva: A free and effective tool for recovering deleted files. Download it from CCleaner’s official site.

Important Procedure: Install the data recovery software on a separate, clean computer. Then, connect the infected hard drive to it as an external drive.

Path 4: System Repair and Diagnostics

These tools can help you get your system running so you can perform other recovery steps.

Hiren’s BootCD PE

This is a bootable Windows PE that contains a suite of useful tools for system recovery and repair. You can download it from the official Hiren’s BootCD website.

Comprehensive Alternatives to Hiren’s BootCD PE
  • MediCat USB: A highly-regarded and extremely comprehensive bootable toolkit.
  • Sergei Strelec’s WinPE: A popular and powerful alternative based on a Windows PE environment.
  • SystemRescue: A Linux-based rescue system designed for repairing unbootable computers and recovering data. Find it at the SystemRescue website.
  • Ultimate Boot CD (UBCD): A veteran, free bootable recovery disk that consolidates numerous diagnostic and repair tools.

Path 5: Specialized Virtualization Recovery (If Applicable)

If your virtual machines were hosted on an ESXi or Hyper-V server and were targeted, the recovery process is more complex.

  • Specialized Software Tools: Tools like DiskInternals VMFS Recovery™ are designed to recover VMDK images. You can find them at the DiskInternals website.
  • Forensic Data Extraction: Tools like DMDE (DM Disk Editor) can sometimes reconstruct files from partially encrypted disks. Find it at the DMDE website.
  • Hypervisor-Specific Tools: For specific strains that target ESXi, tools like CISA’s ESXiArgs-Recover Script can be used.

Path 6: Network Storage Recovery (If Applicable)

If the ransomware encrypted files on a NAS or DAS device, the recovery options differ from a standard Windows PC.

  • Public Decryption Tools: Reiterate the importance of using the No More Ransom Project and vendor tools.
  • Leveraging Built-in Features: The most effective method for NAS devices is Snapshots. Brands like Synology and QNAP have a snapshot feature that can revert shared folders to a state just minutes before the attack.
  • Cloud Sync Versioning: If your NAS was configured to sync files to a cloud service, you may be able to use the version history features of those services to restore your files.

Essential Incident Response and Prevention

A full response includes containment, eradication, and future prevention.

Containment and Eradication

  1. Isolate the Infected System: Immediately disconnect the machine from the network to prevent the ransomware from spreading.
  2. Remove the Malware: Use a reputable antivirus or anti-malware program to scan for and remove the ransomware executable.
  3. Change All Passwords: Assume that credentials have been compromised and change passwords for all user accounts, especially administrators, and for any network services or cloud accounts.

Hardening Your Defenses with Modern Protection

  • Endpoint Protection Platforms (EPP/EDR): Solutions like SentinelOne Singularity™ Endpoint and CrowdStrike Falcon focus on preventing ransomware by identifying and neutralizing threats using behavioral AI.
  • Integrated Cyber Protection: Tools like Acronis Cyber Protect combine a traditional antivirus with integrated backup and recovery.
  • The 3-2-1 Backup Rule: Maintain at least three copies of your data, on two different types of media, with one copy stored off-site or in the cloud.
  • Employee Training: Conduct regular security awareness training to teach staff how to spot phishing emails and malicious links.
  • Patch Management: Regularly patch all systems and software to close vulnerabilities that ransomware can exploit.

Post-Recovery: Securing Your Environment and Ensuring Resilience

This critical phase begins after your files have been restored.

  • Step 1: Verify Data Integrity and Completeness: Check restored files for corruption and completeness by opening a sample from different directories and file types.
  • Step 2: Conduct a Full, Deep System Scan: Run a full, deep scan of your entire system using a reputable antivirus or anti-malware solution.
  • Step 3: Fortify All Credentials: Change all user, admin, service, and cloud passwords. Enforce the use of strong, unique passwords for every account.
  • Step 4: Patch and Update Everything: Update the OS and all third-party applications to close security holes that the attackers may have exploited.
  • Step 5: Reconnect to the Network Cautiously: Monitor for unusual activity upon reconnection.
  • Step 6: Implement or Strengthen a 3-2-1 Backup Strategy: Create or improve a robust backup system and test it regularly.
  • Step 7: Perform a Post-Incident Analysis: Review how the attack happened. Use this knowledge to improve user training and security policies.

Reporting Obligations

Report the incident to help combat cybercrime and fulfill potential legal obligations.

  • Report to Law Enforcement: In the US, file a complaint with the FBI’s IC3. In the UK, report to Action Fraud.
  • Report to CISA: The U.S. Cybersecurity & Infrastructure Security Agency (CISA) urges reporting via its portal.

Conclusion

The Ripper ransomware represents a significant threat due to its strong encryption, its connection to the established MedusaLocker family, and its aggressive double extortion tactics. However, like all ransomware, it can be defeated with a calm, methodical, and prepared response. The path to resilience begins long before an attack occurs. Investing in a multi-layered security posture that combines advanced endpoint protection, robust network security, and a disciplined 3-2-1 backup strategy is the most effective defense.

Paying the ransom only fuels the criminal ecosystem and offers no guarantee of a positive outcome. By understanding the tactics of threats like Ripper and preparing accordingly, you can transform a potential catastrophe into a manageable incident, ensuring that your data—and your peace of mind—remain secure.


Frequently Asked Questions (FAQ)

It means Ripper is a variant of a known and well-established ransomware family. This can help security researchers identify its behaviors and encryption methods, but it also means it’s built on a proven, malicious framework.

After you have completely removed the ransomware from your system, you can change your wallpaper back through the Windows Settings app (Personalization > Background). It’s crucial to ensure the malware is fully eradicated first.

Start with our specialized decryptor. If that is not an option, use the ID Ransomware service to identify the strain, then check the No More Ransom Project and the websites of major vendors like Emsisoft and Kaspersky.

Yes, in cases of double extortion, you should assume the threat is credible. The attackers have exfiltrated data and will use it as leverage. This makes incident response and reporting even more critical.

Ripper typically spreads through phishing emails, exploiting unpatched software vulnerabilities, malicious ads, or via downloads of pirated software, key generators, and cracking tools from untrustworthy sources.

The best defense is a combination of robust, immutable backups (like those from Veeam) and advanced endpoint protection (EDR) that can detect and stop the data exfiltration phase before it completes.

No. There is absolutely no guarantee that the attackers will delete the stolen data after payment. They may keep it for future leverage or sell it on the dark web.

Without a backup, your only options are to wait for a public decryptor to be released or to use data recovery software as a last resort, though its success is unlikely with modern ransomware like Ripper.


Contact Us To Purchase The Ripper Decryptor Tool

Similar Posts

One Comment

Leave a Reply

Your email address will not be published. Required fields are marked *