TeslaCrypt is a ransomware which infects a computer mostly with some specific games installed and encrypt important files. And then, it extorts a ransom of $500 in order to obtain the secret key for decrypting the encrypted files.
The ransomware was first detected in August 2015 and till then, it has infected and still infecting many computers.
How does TeslaCrypt infect a computer
Most of the TeslaCrypt attack involves spam emails. Attackers first send spam emails to victims and use social engineering to convince the victims to open the email.
The subject line of the email may contain :
Upon infection, the ransomware searches for a list of files with some specific extensions, which are mainly involved in saving data, player profiles, custom maps and game mods, and encrypt them. The newer variants of TeslaCrypt are not focused on computer games only, and can encrypt files including Word, PDF and JPEG.
TeslaCrypt encrypts important files with AES symmetric keys and asks for a ransom of $500 worth of Bitcoins to get the secret key to decrypt the encrypted files.
Financial gain of attackers of TeslaCrypt
Attackers buy TeslaCrypt ransomware from underground blackmarket. They pay the TeslaCrypt authors and access various distribution channels like spam botnets or exploit kit.
After that, the attackers employ various attack methods to distribute the malware and infect computers. And upon infection, they extort money from the victims.
Is TeslaCrypt same as CryptoLocker
Though TeslaCrypt resembles CryptoLocker in function, but TeslaCrypt is quite different from CryptoLocker. TeslaCrypt shares no code with CryptoLocker and it is developed quite independently. So, TeslaCrypt is not same as CryptoLocker.
TeslaCrypt decryption key is already published. So, if you are already affected by TeslaCrypt, you can retrieve your files using the key.
And, we can always take a couple of steps to safeguard ourselves from any ransomware like TeslaCrypt :
- Do not open email attachments if you are not very sure of the sender of the email.
- Do not click on suspicious links.
- Download software only from trusted source.
- Keep your computer updated with recent anti-malware programs from some trusted sources.
- Update commonly used software with recent security patches. Most of the time, attackers infect a computer with a malware exploiting security vulnerabilities of commonly used software in the computer.
- Take regular backups of your important files.
- And, if you are infected with any ransomware, never ever pay ransom to the attackers. Instead, look for some good anti-malware programs to remove the ransomware and retrieve the data. Because, extorting money from the victims is the main motivation of the attackers behind making these attacks. So, paying ransom to them will only make the problem worse.
So, beware of various malware and how to prevent them. And, stay safe, stay protected.