According to the Age manual, the utility was designed as a replacement for GPG to encrypt "files, backups, and streams." Instead of creating a ransomware that utilizes commonly used
encryption algorithms such as AES+RSA, the threat actors behind AgeLocker appear to be using the Age command line tool to encrypt a victim's files. Experts explained that Age uses the X25519 (an ECDH curve), ChaChar20-Poly1305, and HMAC-SHA256 algorithms,
which makes it a very secure method to encrypt a file.
Learn more >