Movatterモバイル変換


[0]ホーム

URL:


Sign in / up
The Register

Cyber-crime

Nitrogen ransomware is so broken even the crooks can't unlock your files

Gang walks away with nothing, victims are left with irreparable hypervisors

iconConnor Jones
Wed 4 Feb 2026 //13:50 UTC

Cybersecurity experts usually advise victims against paying ransomware crooks, but that advice goes double for those who have been targeted by the Nitrogen group. There's no way to get your data back from them!

According to Coveware, which peered under the hood of Nitrogen's ransomware program, a programming error prevents the gang's decryptor from recovering victims' files, so paying up is futile.

The finding specifically concerns the group's malware that targetsVMware ESXi. Coveware said that the program encrypts files with the wrong public key, making it impossible for the criminals to decrypt them, even if the victim pays for a decryption tool.

Nitrogen's malware makes the error of loading a new variable, a QWORD, into memory so that it overlaps with the public key.

Because the malware loads the public key at offset rsp+0x20 and the 8-byte QWORD at rsp+0x1c, it overwrites the first four bytes of the public key, meaning that an attacker-supplied decryptor would fail.

"Normally, when a public-private Curve25519 keypair is generated, the private key is generated first, and then the public key is derived subsequently based on the private key," Covewaresaid.

"The resulting corrupted public key wasn't generated based on a private key, it was generated by mistakenly overwriting a few bytes of another public key. The final outcome is that no one actually knows the private key that goes with the corrupted public key."

Nitrogen has been around since 2023. According to Coveware, it began as one of the various offshoots that borrowed code from theleaked Conti 2 builder.

Barracuda Networks previouslyreported that it evolved into a ransomware group slowly over time. It first developed malware to facilitate initial access for others, although its operators didn't work as initial access brokers, but began extorting organizations in or around September 2024.

While it is not one of the most prolific groups in operation, it is also not to be underestimated.

Even with this latest finding, which will go down alongside other epicown goals by ransomware gangs, it's hard to see the funny side with this one.

The coding error takes this financially-motivated ransomware gang into the realm of pure destruction, where both parties walk away losers. ®


More about

More like these
×

More about

Narrower topics

Broader topics

More about


COMMENTS

More about

More like these
×

More about

Narrower topics

Broader topics

TIP US OFF

Send us news


Other stories you might like

Linus T tells The Reg how Linux solo act became a global jam session

Ts'o, Hohndel and the man himself spill beans on how checks in the mail and GPL made it all possible
OSes18 Feb 2026 |

Qualcomm set to triumph in UK smartphone ‘patent tax’ case

Consumer group Which? brought the case and now plans to bail after court indicated it would lose
Personal Tech18 Feb 2026 |2

Palo Alto CEO says AI isn’t great for business, yet

Sees little enterprise AI adoption other than coding assistants, buys Koi for what comes next
Security18 Feb 2026 |1

Unlocking the hidden power of unstructured data with AI

Hyland is helping enterprises turn their fragmented, unstructured data into governed, AI-ready intelligence
Sponsored Feature

Indian conglomerate Adani plans very slow $100 billion AI datacenter build

PM Modi tells citizens AI will lift them up, not take their jobs
Public Sector18 Feb 2026 |

Anthropic's latest Sonnet gets better at using computers, amid bouts of existential angst

Version 4.6 can also be 'warm, honest, prosocial, and at times funny'
AI + ML18 Feb 2026 |2

China-linked snoops have been exploiting Dell 0-day since mid-2024, using 'ghost NICs' to avoid detection

Full scale of infections remains 'unknown'
Cyber-crime18 Feb 2026 |3

Gemini lies to user about health info, says it wanted to make him feel better

Though commonly reported, Google doesn't consider it a security problem when models make things up
AI + ML17 Feb 2026 |15

Amazon's $200 billion capex plan: How I learned to stop worrying and love negative free cash flow

It isn't insane, and Amazon will be fine when the music stops. Other players, maybe not so much
On-Prem17 Feb 2026 |7

Infosys bows to its master, signs deal with Anthropic

After a selloff fueled by fears AI could upend the outsourcing model
AI + ML17 Feb 2026 |3

China remains embedded in US energy networks 'for the purpose of taking it down'

Plus 3 new goon squads targeted critical infrastructure last year
Cyber-crime17 Feb 2026 |11

GPU who? Meta to deploy Nvidia CPUs at large scale

CPU adoption is part of deeper partnership between the Social Network and Nvidia which will see millions of GPUs deployed over next few years
Systems17 Feb 2026 |

[8]ページ先頭

©2009-2026 Movatter.jp