Skip to content

bijaylimbu/EByte-Ransomware

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

EByte-Ransomware

Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.



Disclaimer

This project is strictly for educational purposes only.
It is intended to demonstrate the implementation of cryptographic techniques and must not be used for malicious, illegal, or unethical purposes. The misuse of this code for unauthorized activities, including data encryption or extortion, may result in severe legal consequences.
The author assumes no liability or responsibility for any damage, loss, or legal action caused directly or indirectly by the use or misuse of this project. Always adhere to ethical guidelines, cybersecurity laws, and regulations.

Brief Overview

EByte is a ransomware written from scratch in Go. It uses a mixture of ChaCha20 and ECIES cryptography to encrypt files securely so that they cannot be recovered by traditional recovery tools. Files encrypted by EByte can only be decrypted using the corresponding decryptor.

Installation & Setup

Pre-requisites:

Running:

  • go run server.go

Encryption Process

  • The encryptor enumerates all drives on the system and proceeds to iterate through each directory recursively.
  • It ignores blacklisted files, directories, and extensions.
  • It generates a unique ChaCha20 key and nonce for each file and encrypts the file using a pattern of 1 byte encrypted, 2 bytes unencrypted.
  • It encrypts the ChaCha20 key and nonce using the ECIES public key and prepends them to the start of the file.

Benefits of ChaCha20 and ECIES

I chose this unique combination of encryption methods for several reasons:

  • ChaCha20's stream-based approach allows for byte-by-byte encryption, enabling the pattern of 1 byte encrypted, 2 bytes unencrypted.
  • ECIES offers similar security to RSA with shorter key lengths, making it a more efficient choice.

Showcase:

First Second In Action

Credits:

About

Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors