New Tool Could Liberate PCs Infected With WannaCryIt replicates the ransomware's encryption key, but it will only work if you haven't rebooted your computer since it became infected.
ByTom Brant•
This story originally appeared onPCMag
Have a computer infected byWannaCry ransomware? If you haven't touched it since the dreaded ransom notice popped up on the screen, there may be a way to free your captive files without paying.
The new fix, developed by French security researchers, only works if your computer hasn't been rebooted since becoming infected with WannaCry. It's called Wanakiwi, and it attempts to replicate WannaCry's encryption key by sniffing out prime numbers -- the building blocks of the widely used RSA encryption method -- that are stored in the ransomware's code. In theory, it's quite simple to use.
"You just need to download the tool and run it on the infected machine," security researcher Matthew Suiche wrote in ablog poston Thursday. "Default settings should work."
Wanakiwi isavailable on Github. Once you've downloaded it and clicked on the wanakiwi.exe executable file, it will automatically begin looking for the prime numbers. But in order for it to find the numbers, Suiche said, you have to "cross fingers that your prime numbers haven't been overwritten," which would happen if you tried to restart your computer at any time after it was infected.
The Wanakiwi tool has been tested to work with Windows XP and Windows 7, which means it should also work with the intervening versions of Windows, Suiche said. Windows 10 is not affected by WannaCry.
Of course, you may be just as concerned about downloading unknown software from Github as you are about WannaCry itself. WhilePCMaghas not tested Wanakiwi because we don't have any computers infected with WannaCry, Europol announcedin a tweeton Thursday that its cybercrime law enforcement division tested it and found that the tool could "recover data in some circumstances."
Meanwhile, if your computer hasn't been compromised by WannaCry, you've got little reason to fear a future infection, assuming you download and install a patch that Microsoft released in March to address the vulnerability that the ransomware targets.