Babuk Tortilla ransomware dealt major blow with release of new decryptor – here’s how victims can recover their data
A decryptor for Babuk Tortilla ransomware has been released following a sting operation by Dutch police with the help of Cisco Talos, offering a vital lifeline for victims


A decryptor for the Babuk Tortilla ransomware variant has been made available by Cisco Talos following a police sting operation which saw a threat actor apprehended in Amsterdam.
Cisco Talos collaborated with Dutch police to identify and apprehend a threat actor involved in cyber attacks using the ransomware variant, authorities said.
In an announcement this week, Cisco Talos researcher Vanja Svajcer said authorities recovered executable code capable of decrypting files affected by Babuk Tortilla ransomware, from which researchers were able to extract and publish the private decryption key used by the hackers.
Talos has shared the key with Avast Threat labs who maintain a decryptor that can recover data encrypted using a number of different strains of the Babuk ransomware.
Avast Threat Labs’ decryptor was originally released in 2021, after the initial disclosure of the Babuk ransomware family and includes all of the known private keys involved in attacks using variants of the malware.
Avast’s Threat Research Team revealed its efforts were made easier by the fact that a single private key was used for all victims of the threat actor, meaning those affected can use the service easily.
Avast’s Babuk decryptor tool is available for free, as are similar tools made to recover files encrypted using a number of different ransomware groups.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Victims unsure of the specific strain of ransomware they have been targeted with can also use free resources such as the NoMoreRansom project, which boasts the largest collection of ransomware decryption tools as well as the ability to identify ransomware strains based on user-uploaded sample files.
Babuk group, from ethical hackers to targeting government agencies
The Babuk group first emerged in 2021. Early signs suggested the group had non malicious intentions, with their focus on revealing security failings in corporate networks.
But this was quickly shown to be false when the group received global media attention after leaking data exfiltrated in an attack on the Washington DC police department in Washington DC.
Other notable targets of the ransomware gang include the Houston Rockets basketball team, with the group threatening to leak 500GB of stolen data if it did not receive payment.
The group also drew headlines when it claimed it would no longer encrypt data it had stolen, opting in favor of a more streamlined approach to extracting ransoms using the threat of leaking data instead.
RELATED RESOURCE
Discover how Maas360 capabilities support more user- and security-centric unified endpoint management
DOWNLOAD NOW
For a moment it looked like the group was going to cease operations after it announced via a post on the dark web that the ransomware’s source code would be made publicly available, which was seized upon by threat researchers to build decryptor tools.
This decision was speculated to be the result of an internal conflict on whether the group should publish all of its stolen data, and risk increased attention from law enforcement agencies.
The Tortilla strain was disclosed by Talos in an exploit involving Microsoft Exchange vulnerabilities in November 2023.
The ransomware was known for its ability to compromise Windows and NAS environments, including ESXi environments, which are a primary component of the infrastructure underpinning VMware’s software suite.

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
Cisco eyes network security gains for agentic AI
News New network security updates aim to secure AI agents across enterprises
-
Cisco patches critical flaw affecting Identity Services Engine
The networking giant has urged enterprises to update immediately
-
96% of businesses have low cyber-readiness, claims Cisco
The 2025 Cisco Cybersecurity Readiness Index shows a concerning number of businesses globally are unprepared for rising AI-related threats.
-
Cisco takes aim at AI security at RSAC with ServiceNow partnership
News The companies claim Cisco AI Defense and ServiceNow SecOps will help address new challenges raised by AI
-
Cisco claims new smart switches provide next-level perimeter defense
News Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches.
-
Cisco is jailbreaking AI models so you don’t have to worry about it
News Cisco's new AI Defense security solution helps organizations shore up LLM security by identifying potential flaws.
-
Cisco dispels Kraken data breach claims, insists stolen data came from old attack
News Cisco has refuted claims it has suffered a data breach after the Kraken threat group posted stolen data online.
-
Cisco patches critical flaws in Identity Services Engine
News Cisco has issued patches for a pair of critical vulnerabilities affecting its Identity Service Engine (ISE).