Regarding Sicarii’s broken decryption process, researchers said that “during execution, the malware regenerates a new RSA key pair locally, uses the newly generated key material for encryption, and then discards the private key.”

  • pivot_root@lemmy.world
    link
    fedilink
    arrow-up
    42
    ·
    19 hours ago

    A hash is at least consistent when given identical inputs. What they created is more like a digital incinerator.