All ways involve getting access to the server storing the private keys. Currently the malware connects to a server in Baltimore (173.246.105.23). However, I have a feeling that it is just acting as a reverse proxy, connecting to the actual server someplace else. In addition, due to the way the malware connects to its command and control server, even if you take the actual server down, the attacker can just set up a new one.Can we have a discussion on what possible ways these files can be decrypted based on each user needing a private key and that key being impossible to attain. What conceivable way could this be done?
You can get both the malware sample as well as a rough overview of how files are encrypted here:We are currently working with this virus now, and wanted to see if anybody still has the original executable that it created. We want to infect one of our test machines to see if we can figure out a fix for the encryption, as well as see how it functions.
http://www.kernelmode.info/forum/viewtopic.php?f=16&t=2945
Downloading the file may require a registration though.