TeslaCrypt Ransomware Wreaking Havoc in Indian Cities

Security experts have detected one fresh variant of TeslaCrypt an infamous ransomware compromising end-user's computer till he pays money demanded as ransom. TeslaCrypt of version 2.0 belongs to an encryptor family and notoriously contaminates gamers' PCs; published The Times of India dated July 19, 2015.

Currently, TeslaCrypt 2.0 is attacking Internet-based businesses and consumers through electronic mail attachments from where the malware is unleashed for blocking end-user from accessing his system till he pays the ransom money. In case of delay in the payment, which should be in dollars, the ransom demanded gets twofold.

TeslaCrypt began contaminating computers within Southeast Asia, Europe and U.S. From there it spread across India, particularly Mumbai and Delhi. During 2015, the ransomware targeted 2 business-owners from Agra who were demanded of a $10,000-and-more ransom sum.

According to Nitin Kasan, Cyber-Cell In-Charge in Agra, during January-June 2015, there were dual instances in the city when the malicious program encrypted critical data-files of the victims followed with blackmailing them towards paying a ransom in return for decrypting those files. The Times of India reported this.

Another victim, Sandeep Gupta, owner of a company in Agra that exports handicraft items, said that during February, his e-mails and company website that had essential shopper information and transaction details became inaccessible when certain unfamiliar hacker from Nigeria blocked them. Bharatpress.com reported this, July 20, 2015.

Gupta described the hackers as forcing him towards agreeing to pay $10,000, with the message threatening that his information would be destroyed if he didn't pay. Gupta stated that he contacted the police cyber-cell of Agra for help so his e-mail account and website could be restored.

South Asia in-charge Managing Director Altaf Halde of Kaspersky Lab the first person to identify TeslaCrypt explains ransomware as a malicious program which extorts digitally. Any entity from an ordinary shopper to a small firm or giant company could be victimized with ransomware. Usually, e-mail with a picture, a zipped folder or an .exe file in an attachment is used for the attack. Opening such an attachment results in the deployment of the malware onto the end-user's computer, Halde tells. Bharatpress.com reported this.

ยป SPAMfighter News - 7/28/2015

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next