TeslaCrypt ransomware TeCake

A new potential threat is hurting in the rear of the Windows PC users, as it is freaking them by prompting to decrypt their files in exchange of a significant amount of money, which was earlier encrypted due to fake security reasons.

The malware is also threatening the users by providing a deadline and mentions that a unique private key generated for the decryption will be destroyed after the deadline. Later, it doubles the ransom amount to regenerate the key.

Well known anti-malware software maker, The Kaspersky Lab has also reported that their security experts have detected the malware from TeslaCrypt ransomware encryptor family. Altaf Halde, managing director (South Asia) of Kaspersky Lab said that it is the 2.0 version from the family and it is of Trojan type, which displays an HTML page to the user similar to the page that was previously shown by CryptoWall 3.0, another notorious ransomware program.

“Ransomware is a type of malware that is a digital mechanism for extortion. The average consumer and both large and small businesses can be victims of ransomware. Such an attack is typically delivered via an email that includes an attachment that could be an executable file, an archive or an image. Once the attachment is opened, the malware is deployed on the user’s system,” Halde further added.

The program says, “Your files have been safely encrypted on this PC: Photos, Videos, documents, etc. Click “Show encrypted files” button to view a complete list of encrypted files, and you can personally verify this.”

In addition, it asks an amount from $150 to $10,000 in exchange for the decryption; payable in Bitcoin. As per a report from TheRegister, in last 10 weeks, the malware has been able to manage around $76,500. It uses Tor anonymity network for all the communication, which makes it difficult to track.

[quote_box_center]

Precaution Measures to prevent the machine from ransomware:

-Create backup of important files on regular basis.

-Most important data should be stored and kept safe in physically disconnected media.

-Anti-malware software should be up to date.

-Avoid using borrowed flash drives.

-Do Not download anything from untrusted websites.

-Ignore the emails from untrusted users, them may contain malware as attachments.

[/quote_box_center]

Tags: , , , , ,

Around the web

Around the web