Jump to content

Recommended Posts

  • ExTS Admin
Posted

Current TeslaCrypt ransomware can't be decrypted

 

http://img.photobucket.com/albums/v708/starbuck50/new-teslacrypt-ransomware-version-released-infections-on-the-rise-497488-2_zps8tde1bvw.jpg

 

 

In the past few days, a new version of the TeslaCrypt ransomware was released, and security researchers have now detected a massive spam campaign distributing this new threat.

 

The first signs of something out of the ordinary were initially spotted on the Bleeping Computer forums, where users started complaining about being infected with ransomware.

 

After further analysis by community members, the ransomware proved to be a new TeslaCrypt version that added minor changes to its code, but these were more than enough to prevent users from using the TeslaDecoder to decrypt their files.

 

While we believe there is no doubt that BloodDolly will eventually update his TeslaDecoder tool to tackle this latest modification, just as he did in the past, users should be very wary these holidays when opening attachments received via unsolicited email, either if coming from a known person or not.

 

Scandinavian users are targeted the most

 

According to Heimdal Security, the company that analyzed the spam campaign, most infections were detected in Europe's Nordic countries.

 

The spam emails contain a ZIP archive and are using the old "Dear client, pay your overdue invoice" routine. Judging by the theme the attackers chose, they might be targeting businesses and not end users, since companies regularly have a hard time keeping track of unpaid invoices and are more prone to opening email attachments from billing-related emails.

 

The ZIP file attached to the email is booby-trapped via a JavaScript file, which, when the user decompresses the archive, connects to a C&C server and downloads the TeslaCrypt ransomware in the form of an EXE file.

 

The Heimdal Security team was not specific if TeslaCrypt installs when launching the EXE into execution or (automatically) when unzipping the file, but let's say you'll be safer if you don't download the ZIP file to begin with.

 

This version of the ransomware encrypts the user's files with the .vvv or .zzz extensions and asks them to pay a ransom in Bitcoin via a page hosted via an .onion domain on the Dark Web. Current detection rate for this new version of TeslaCrypt on VirusTotal is 3/55.

 

 

 

Source:

http://news.softpedia.com/news/new-teslacrypt-ransomware-version-released-infections-on-the-rise-497488.shtml

Member of:

UNITE

  • Replies 0
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

Top Posters In This Topic

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...