Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

TeslaCrypt Ransomware Project Seems to Close Down, Offers Decryption Key Free of Cost


The creators of the infamous TeslaCrypt ransomware have announced that they have closed down their operation and released a master decryption key and also offered apology for causing chaos for years.

A security researcher of Slovakia-based security firm ESET made this revelation, who contacted the creators of TeslaCrypt through a 'support channel' on the dark web normally reserved for victims of the Trojan malware to make payments to regain access to their locked files of their computer.

A researcher of Slovakian antivirus firm ESET asked a question prompted by that note, who had found that TeslaCrypt operations looked to be closing down in current weeks.

ESET has created a decryptor tool, which is available with detailed instructions for downloading from the ESET website by using the master key. There is another TeslaCrypt decoder with an easier-to-use interface being posted on the website of Bleeping Computer.

Abrams says that operators of TeslaCrypt have gradually switched over to the CryptXXX ransomware instead. It seems that operators of TeslaCrypt are not actually "sorry", but they have simply found a better ransomware strain.

TeslaCrypt has been broken many times during the past due to which TeslaDecoder application of BloodyDolly exists. So switching over to CryptXXX might have been a bad idea because Kaspersky had also broken the ransomware twice. It cracked CryptXXX 2.0 and CryptXXX 1.0 only few days after crooks released it.

TeslaCrypt first appeared in the beginning of 2015, and it was unique in the way that it targeted gamers by encrypting data like saving files and custom maps in addition to the usual range of documents, photos and many more. It would look for total 185 various file extensions to encrypt. Softpedia.com posted on 19th May, 2016, stating that the only way to recover your files was to pay the ransom amount or start using backups of your data.

During the past months, some white hats have also hacked the distribution networks of different ransomware strains, such as Locky, empty files, distributing antivirus software or warning messages in lieu of ransomware.

ยป SPAMfighter News - 5/26/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next