History And Evolution Of TeslaCrypt Ransomware The Virus

· 4 min read
History And Evolution Of TeslaCrypt Ransomware The Virus


TeslaCrypt is a ransomware program that encrypts files. program designed for all Windows versions, including Windows Vista, Windows XP, Windows 7 and Windows 8. This program was released in the first time around the February's end. TeslaCrypt infects your computer and looks for data files to encode.



When all your data files have been infected, an app will be displayed. It will provide details about how to retrieve them. There is a link in the instructions to connect you to the TOR Decryption Service website. This site will provide details about the current ransom amount, how many files have been encrypted, as well as how to make payment so your files are released. The average ransom is at $500. It can be paid in Bitcoins. Each victim will have a unique Bitcoin address.



Once TeslaCrypt is installed on your computer, it generates an executable with a random label within the %AppData% folder. The executable launches and examines your computer's drive letters looking for files that can be encrypted. It attaches an extension to the file's name and it encrypts any data files it finds. The name is based on the version that affected your computer. The program is now using different extensions for files to encrypt encrypted files with the release of new versions of TeslaCrypt. TeslaCrypt currently uses the following extensions for encrypted files:.cccc..abc..aaa..zzz..xyz. You could make use of TeslaDecoder to decrypt encrypted files for free. It obviously depends on the version of TeslaCrypt that is infected with your files.



TeslaCrypt scans every drive letter on your computer in order to locate files that can be encrypted. It can scan network shares, DropBox mappings and removable drives. It only targets network shares data files in the event that the network share has been mapped as a drive letters on your computer. If you don't have mapped the network share as a drive letter the ransomware won't encode the files on the network share. After it has finished scanning your PC, it will erase all Shadow Volume Copies. This prevents you from restoring the affected files. The ransomware's version is indicated by the title of the application that appears after encryption.



How TeslaCrypt infects your computer



TeslaCrypt is infected by computers when the user visits an untrusted website that runs an exploit kit and whose system is running outdated software. Hackers hack websites to distribute this malware. An exploit kit is a special software program that they install. This tool aims to exploit vulnerabilities in the programs of your computer. Acrobat Reader and Java are just a few of the programs with weaknesses. After the exploit kit has successfully exploited the vulnerabilities on your computer, it will automatically install and launch TeslaCrypt.



It is crucial to ensure that Windows and all other programs are up-to date. This will safeguard your computer from potential weaknesses that could lead to infection with TeslaCrypt.



This ransom ware was the first of its kind to target data files that are used by PC video games in a proactive manner. It targets game files from games such as MineCraft, Steam, World of Tanks, League of Legends, Half-life 2. Diablo, Fallout 3 Skyrim, Dragon Age Dragon Age, Call of Duty and RPG Maker are just a handful of the games it targets. However, it's not been established if the game's targets lead to increased revenue for the malware creators.



Versions of TeslaCrypt, and the associated file extensions



TeslaCrypt is updated regularly to incorporate new encryption techniques and file extensions. The initial version encrypts files using the extension .ecc. In this scenario, encrypted files aren't associated with data files. The TeslaDecoder can also be used to retrieve the encryption key used in the first place. It is possible to do this if the key used to decrypt was zeroed out and partial key found in key.dat. The key for decryption can be located in the Tesla request to the server.



There is another version with encrypted extensions for files of .ecc and .ezz.  Pubg Qa  without the author's private key in the event that the encryption was zeroed out. The encrypted files are not linked to the data file. Decryption key can be git from the Tesla request sent to the server.



For the versions with an extension file name .ezz and .exx, the original decryption key is not recovered without the authors' private key, if the decryption key was zeroed out. Files encrypted with the extension.exx can be paired with data files. You can also request a decryption key from the Tesla server.



Versions that use encrypted file extensions.ccc.,.abc..aaa..zzz, and.xyz do not make use of data files. The key for decryption cannot be stored on your system. It is only decrypted if the victim records the key as it is being transmitted to a server. You can get the decryption key by contact Tesla. This is not available for TeslaCrypt versions prior to v2.1.0.



Release of TeslaCrypt 4.0



The authors have released TeslaCrypt4.0 sometime in March 2016. The new version has been updated to fix a glitch that affected files larger than 4GB that were corrupted. It also comes with new ransom notes and does not require encryption of encrypted files. It is difficult for users to find out about TeslaCryot or what occurred to their files as there is no extension. With the latest version, victims will have to follow the path outlined in the ransom notes. There are little established ways to decrypt files without extension without a purchased decryption keys or Tesla's private key. The files could be decrypted in the event that the victim took the key as it was sent to the server during encryption.